The security team at Certkiller Inc. is working on understanding attacks that happen in the network. What type of attack is characterized by exploitation of well-known weaknesses, use of ports that are allowed through a firewall, and can never be completely eliminated?
A.
Network reconnaissance
B.
Man-in-the-middle
C.
Trust exploitation
D.
Application layer
Explanation:
The primary problem with application layer attacks is that they often use ports that are allowed through a firewall.
Reference: Safe White papers 68
SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks