Study for the Ethical Hacking Essentials Test. Explore interactive flashcards and multiple-choice questions with hints and explanations. Prepare thoroughly and boost your exam readiness!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following protocols is vulnerable to a sniffing attack as passwords and data are sent in clear text?

  1. Hypertext Transfer Protocol Secure (HTTPS)

  2. File Transfer Protocol (FTP)

  3. Simple Network Management Protocol (SNMP)

  4. Secure Sockets Layer (SSL)

The correct answer is: File Transfer Protocol (FTP)

File Transfer Protocol (FTP) is vulnerable to sniffing attacks because it transmits data, including usernames and passwords, in plain text. This means that anyone who is monitoring the network traffic can easily capture this information, such as through packet sniffing techniques. This vulnerability presents a significant security risk, especially in environments where sensitive information is being transferred. In contrast, other protocols like HTTPS, which is an extension of HTTP, and Secure Sockets Layer (SSL) provide encrypted communication between clients and servers, making it much more difficult for attackers to intercept and read the data being transmitted. Simple Network Management Protocol (SNMP) can also have vulnerabilities if proper community strings are not configured, but it is generally used for network management rather than the direct transmission of sensitive user credentials. Thus, the nature of FTP's data transmission method is why it stands out as particularly susceptible to sniffing attacks.