Two weeks after installation, a network technician is now unable to log onto any of the newly installed company switches. The technician suspects that a malicious user may have changed the switches' settings before they were installed in secure areas. Which of the following is the MOST likely way in which the malicious user gained access to the switches?

A. Via SSH using the RADIUS shared secret
B. Via HTTP using the default username and password
C. Via console using the administrator's password
D. Via SNMP using the default RO community


Answer: B. Via HTTP using the default username and password

Computer Science & Information Technology

You might also like to view...

A table used to create a many-to-many relationship is called a ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

You would use Word's ________ view to display a document in a hierarchical form, clearly showing the levels of heading detail

A) Draft B) Presentation C) Outline D) Annotations

Computer Science & Information Technology

A(n) ________ is a list of sources referenced in a report and is listed on a separate page at the end of the report

Fill in the blank(s) with correct word

Computer Science & Information Technology

Selections can be nested inside other selections.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology