A home invasion occurred recently in which an intruder compromised a home network and accessed a WiFI- enabled baby monitor while the baby's parents were sleeping.
Which of the following BEST describes how the intruder accessed the monitor?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
The BEST description of how the intruder accessed the baby monitor is option D, default configuration.
Many devices come with default login credentials and configurations that are easy to guess or exploit. If the owner of the device fails to change these defaults, an attacker can use them to gain unauthorized access to the device.
In the case of the compromised baby monitor, the parents may have failed to change the default login credentials for the monitor, or the monitor may have been shipped with weak or easily guessed default login credentials. The attacker may have scanned the home network for open ports or vulnerable devices and discovered the baby monitor. With the default login credentials, the attacker could log in and access the monitor's audio and video feeds.
Antivirus software (option A) and WiFi signal strength (option B) are not relevant to the intrusion. Social engineering (option C) is a tactic used by attackers to trick people into divulging sensitive information or performing actions that compromise their security. It is possible that social engineering was used to obtain the login credentials for the baby monitor, but the question does not provide any evidence to support this option.