Yes, the FTP protocol can be breached, making option B the correct answer. FTP transmits usernames, passwords, and datain clear text, which makes it highly vulnerable to interception and attack.
Attackers can exploit FTP through techniques such as credential sniffing, brute-force attacks, anonymous access abuse, and man-in-the-middle attacks. Ethical hackers frequently demonstrate FTP weaknesses during penetration testing to highlight the risks of using outdated protocols.
Option A is incorrect because asking for credentials is not an attack technique. Option C is incorrect because FTP is considered insecure by modern security standards.
From a defensive standpoint, FTP should be replaced with secure alternatives such asSFTP or FTPS, which encrypt authentication and data transfers. Ethical hackers use FTP breach demonstrations to encourage protocol modernization and better access controls.
Understanding insecure protocols is essential for managing information security threats. Eliminating weak services like FTP significantly reduces an organization’s attack surface and exposure to credential compromise.