AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: An attacker Jim installed a rouge access eccouncil video

Question 1 Be Honest
« Back   Next ethical-hacker Certification Question »
Answer

Full Certification Question

An attacker Jim installed a rouge access point within an organization's perimeter and attempted to intrude into its internal network. Jackson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak outdated security mechanisms that are open to attack. What is the type of vulnerability assessment performed by Jackson in the above scenario?