YES, asking the administrator for the user and password.
The Answer Is:
B
This question includes an explanation.
Explanation:
The File Transfer Protocol (FTP) is one of the oldest and most widely used protocols for moving files across a network. However, from a security standpoint, standard FTP is inherently vulnerable because it was designed without security in mind. It transmits all data, including sensitive login credentials (usernames and passwords), in "cleartext". This means that anyone with the ability to "sniff" or intercept the network traffic—using tools like Wireshark—can easily read the credentials as they pass through the network.
A breach of the FTP protocol is highly possible using appropriate techniques such as man-in-the-middle (MITM) attacks, brute-forcing, or exploiting specific vulnerabilities in the FTP server software itself. Because FTP does not use encryption, it provides a massive attack vector for hackers to steal data or gain a foothold in an organization’s internal systems. While asking an administrator (Option C) is a form of social engineering, the technical breach refers to the exploitation of the protocol's inherent weaknesses.
To mitigate this attack vector, ethical hacking strategies strongly advocate for the replacement of standard FTP with secure alternatives like SFTP (SSH File Transfer Protocol) or FTPS (FTP over SSL/TLS). These protocols encrypt both the credentials and the data being transferred, rendering intercepted information unreadable. In a professional penetration test, checking for open FTP ports and attempting to sniff traffic or use default credentials are standard procedures to demonstrate the risk of using legacy, unencrypted protocols in a modern network environment.
CEHPC PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"