An attacker is scanning a network for available devices. A r…
An attacker is scanning a network for available devices. A router exposes the fact that it allows easy authentication with no need for a brute force password attack. A server responds to the scan, and is shown to be listening to FTP, SMTP, and IMAP requests. What two threat vectors are present in this scenario?