header bg


An attacker recently compromised a small office's wireless network by brute-forcing a PIN to get access. The attacker then changed the DNS settings on the router, allowing malware to propagate throughout the network. Which of the following arrangements MOST LIKELY PERMITTED THE ATTACK? (Select two.)

A Default login