Which of the following protocols was used to compromise…

During a business trip a user connects to the hotel’s wireless to send emails to customers. The user notices the next day that emails have been sent from the user’s account without consent.
Which of the following protocols was used to compromise the user’s email password utilizing a network sniffer?

During a business trip a user connects to the hotel’s wireless to send emails to customers. The user notices the next day that emails have been sent from the user’s account without consent.
Which of the following protocols was used to compromise the user’s email password utilizing a network sniffer?

A.
SSL

B.
HTTP

C.
TFTP

D.
DNS



Leave a Reply 0

Your email address will not be published. Required fields are marked *