AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: Lewis, an attacker, performed sniffing on a eccouncil video

Question 1
« Back   Next ethical-hacker Certification Question »

Full Certification Question

Lewis, an attacker, performed sniffing on a target organization’s network and found that one of the protocols used by the target organization is vulnerable as it allows a client to access and manipulate the emails on a server. Lewis exploited that protocol to obtain the data and employee credentials that are transmitted in cleartext. Which of the following protocols was exploited by Lewis in the above scenario?