header bg

Scan QR code or get instant email to install app

Question:

An attacker recently compromised a small office's wireless network by brute-forcing a PIN to get access. The attacker then changed the DNS settings on the router, allowing malware to propagate throughout the network. Which of the following arrangements MOST LIKELY PERMITTED THE ATTACK? (Select two.)

A Default login
explanation

Comments

Leave a Reply

Your email address will not be published.

*