A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)
MelvinJohn
Highly Voted 4 years, 5 months agoLyndi
Highly Voted 5 years, 4 months agoDameonRaye
3 years, 6 months agoclmxr16
Most Recent 3 months, 1 week agoc22e828
1 year, 3 months agoanotherpirate
2 years, 6 months agoPigBenis
3 years, 3 months agoPigBenis
3 years, 3 months agoginarina
3 years, 3 months ago136898is42
3 years, 3 months agoUGotThis
3 years, 5 months agoUGotThis
3 years, 5 months agoSamuelSami
3 years, 7 months agoLeadBasedPaint
3 years, 9 months agoDameonRaye
3 years, 6 months agol0609890
4 years agoOCD
4 years agouser54321
3 years, 10 months agoTomTK
3 years, 7 months agoTy_ty
4 years, 3 months agogoveaernesto
4 years, 5 months agoDirkster
4 years, 8 months ago