Weakly configured remote access ports and services provide openings in perimeter defenses, allowing external attackers to gain access to resources and execute commands or introduce malicious software.
|
The following vulnerabilities is most likely to be exploited by an external threat the infrastructure?
The correct answer is: Weakly configured remote access.
Weakly configured remote access ports and services provide openings in perimeter defenses, allowing external attackers to gain access to resources and execute commands or introduce malicious software. |