A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access.
The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E. F.CF.
The attacker was able to compromise the wireless network by brute-forcing the PIN and then modifying the DNS settings on the router, which allowed them to spread malware to the entire network.
Based on the scenario provided, the two most likely configurations that allowed the attack to take place are:
C. Default login - The use of default login credentials, which are often publicly available, makes it easy for an attacker to gain access to the network. The attacker may have easily obtained the default login credentials for the router and then logged in to change the DNS settings.
D. Outdated firmware - Outdated firmware on the router can contain vulnerabilities that an attacker can exploit to gain access to the network. The attacker may have taken advantage of a known vulnerability in the router's firmware to brute force the PIN and then modify the DNS settings.
The other options, such as A. Guest network, B. TKIP, E. WPS, and F. WEP, are not directly related to the attack in the scenario provided. However, it's worth noting that using weak encryption methods like TKIP or WEP can make it easier for an attacker to gain access to the network, and using WPS can also be a security risk if not properly configured.
Overall, it's important to ensure that network devices are secured with strong, unique login credentials and kept up to date with the latest firmware updates to reduce the risk of unauthorized access and compromise.