B. Default credentials
Explanation: Many switches come with default login credentials (e.g., "admin" and "password"), which can be easily exploited if not changed, making it a common vulnerability.
C. Default protocols
Explanation: Some switches may have insecure protocols enabled by default (e.g., Telnet instead of SSH), which can expose the device to attacks if not properly configured.
Incorrect Responses:
A. Default port state: While port configuration is important, this is less commonly a direct vulnerability compared to default credentials and protocols.
D. Default encryption: Switches typically do not come with encryption settings enabled by default, so this is less of a vulnerability focus.
E. Default IP address: This can be a concern, but it’s not as critical as default credentials or insecure protocols.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
044f354
3 months ago