header bg

Scan QR code or get instant email to install app


An attacker recently compromised a small office's wireless network by brute-forcing a PIN to get access. The attacker then changed the DNS settings on the router, allowing malware to propagate throughout the network. Which of the following arrangements MOST LIKELY PERMITTED THE ATTACK? (Select two.)

A Default login

Related Information


Leave a Reply

Your email address will not be published. Required fields are marked *