Which of the following configurations MOST likely allowed the attack to take place?

A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.

Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)
A . Guest network
B . TKIP
C . Default login
D . Outdated firmware
E . WPS
F . WEP

Answer: CF

Latest 220-1002 Dumps Valid Version with 623 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments