Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 350-701 Topic 7 Question 73 Discussion

Actual exam question for Cisco's 350-701 exam
Question #: 73
Topic #: 7
[All 350-701 Questions]

An organization has two systems in their DMZ that have an unencrypted link between them for communication.

The organization does not have a defined password policy and uses several default accounts on the systems.

The application used on those systems also have not gone through stringent code reviews. Which vulnerability

would help an attacker brute force their way into the systems?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Meghan
9 days ago
I bet the IT team responsible for this setup is sweating bullets right now. This is like a buffet for hackers. C) missing encryption is the way to go!
upvoted 0 times
...
Xenia
10 days ago
B) lack of input validation. Even if the other issues are present, proper input validation could help mitigate many attacks. Gotta cover all the bases, you know?
upvoted 0 times
...
Thurman
12 days ago
Haha, this is like a hacker's paradise! With no encryption, default accounts, and sloppy code reviews, it's like leaving the keys in the ignition and the doors unlocked. I'm going with C) missing encryption.
upvoted 0 times
...
Lucille
22 days ago
I think lack of input validation could also be a vulnerability, as it can allow attackers to inject malicious code into the systems.
upvoted 0 times
...
Lili
22 days ago
I'm going with A) weak passwords. If the organization doesn't have a password policy, chances are those default accounts have weak, easy-to-guess passwords. That's the low-hanging fruit for an attacker.
upvoted 0 times
Leonor
13 hours ago
User 3: Lack of input validation could also be a vulnerability.
upvoted 0 times
...
Stanton
2 days ago
User 2: Definitely, weak passwords are a common entry point for attackers.
upvoted 0 times
...
Shizue
4 days ago
User 1: A) weak passwords
upvoted 0 times
...
...
Cecil
23 days ago
I agree with Olene, weak passwords make it easier for attackers to guess and gain unauthorized access.
upvoted 0 times
...
Gilberto
24 days ago
The obvious answer is C) missing encryption. With unencrypted communication and default accounts, an attacker can easily brute-force their way in. This is like leaving the front door wide open!
upvoted 0 times
...
Olene
24 days ago
I think the vulnerability that would help an attacker brute force their way into the systems is weak passwords.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77