Attacker Rony installed a rogue access point within an organization’s perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack.
What is the type of vulnerability assessment performed by Johnson in the above scenario?
eli117
Highly Voted 1 year, 8 months agovictorfs
1 year, 7 months agoduke_of_kamulu
Most Recent 10 months, 2 weeks agoinsaniunt
1 year agoIPconfig
1 year, 1 month agoIPconfig
1 year, 1 month agoI_Know_Everything_KY
10 months, 2 weeks agokunnu
1 year, 3 months agoSailOn
1 year, 3 months agoZacharyDriver
1 year, 5 months agoVincent_Lu
1 year, 6 months agovictorfs
1 year, 7 months agoSoloMaan
1 year ago