List of questions
Related questions
Question 700 - CISSP discussion
An organization discovers that its secure file transfer protocol (SFTP) server has been accessed by an unauthorized person to download an unreleased game. A recent security audit found weaknesses in some of the organization's general information technology (IT) controls, specifically pertaining to software change control and security patch management, but not in other control areas.
Which of the following is the MOST probable attack vector used in the security breach?
A.
Buffer overflow
B.
Weak password able to lack of complexity rules
C.
Distributed Denial of Service (DDoS)
D.
Cross-Site Scripting (XSS)
Your answer:
0 comments
Sorted by
Leave a comment first