Attacker Rony installed a rogue access point within an organization's perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack.
What is the type of vulnerability assessment performed by Johnson in the above scenario?
blacksheep6r
Highly Voted 2Â years, 8Â months agoartillery
2Â years, 2Â months agoSilascarter
2Â years, 7Â months agomamu998
Most Recent 9Â months, 3Â weeks agoDaniel8660
1Â year, 8Â months agouday1985
2Â years agoANDRESCB1988
2Â years, 11Â months agoKelvinNg
3Â years, 1Â month ago