PrepAway - Latest Free Exam Questions & Answers

What type of attack is characterized by exploitation of well-known weaknesses, use of ports that are allowed t

The security team at Certkiller Inc. is working on understanding attacks that happen in the network. What type of attack is characterized by exploitation of well-known weaknesses, use of ports that are allowed through a firewall, and can never be completely eliminated?

PrepAway - Latest Free Exam Questions & Answers

A.
Network reconnaissance

B.
Man-in-the-middle

C.
Trust exploitation

D.
Application layer

Explanation:
The primary problem with application layer attacks is that they often use ports that are allowed through a firewall.
Reference: Safe White papers 68
SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks


Leave a Reply