Two weeks after installation, a network technician is now unable to log onto any of the newly installed company switches. The technician suspects that a malicious user may have changed the switches' settings before they were installed in secure areas. Which of the following is the MOST likely way in which the malicious user gained access to the switches?

A. Via SSH using the RADIUS shared secret
B. Via HTTP using the default username and password
C. Via console using the administrator's password
D. Via SNMP using the default RO community

Answer: B. Via HTTP using the default username and password

Computer Science & Information Technology

You might also like to view...

A field is a predefined area where a specific type of data is entered

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ is the temporary storage location for cell contents copied from a worksheet

A) Paste area B) Clipboard C) Excel table D) Office Pane

Computer Science & Information Technology