Which of the follow...
 
Notifications
Clear all

Which of the following configurations MOST likely allowed the attack to take place?

1 Posts
1 Users
0 Likes
159 Views
(@finnecolton)
Noble Member
Joined: 2 years ago
Posts: 729
Topic starter  

A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.

Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

  • A . Guest network
  • B . TKIP
  • C . Default login
  • D . Outdated firmware
  • E . WPS
  • F . WEP

Show Answer Hide Answer

Suggested Answer: C,F

   
Quote
Topic Tags

Latest CompTIA 220-1002 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: