which the malicious user gained access to the switches?

Two weeks after installation, a network technician is now unable to log onto any of the newly
installed company switches. The technician suspects that a malicious user may have changed the
switches’ settings before they were installed in secure areas. Which of the following is the MOST
likely way in which the malicious user gained access to the switches?

Two weeks after installation, a network technician is now unable to log onto any of the newly
installed company switches. The technician suspects that a malicious user may have changed the
switches’ settings before they were installed in secure areas. Which of the following is the MOST
likely way in which the malicious user gained access to the switches?

A.
Via SSH using the RADIUS shared secret

B.
Via HTTP using the default username and password

C.
Via console using the administrator’s password

D.
Via SNMP using the default RO community

Explanation:



Leave a Reply 5

Your email address will not be published. Required fields are marked *


Alex

Alex

Why the answer is B, not C?

Lesedi

Lesedi

The answer is B because all ‘new’ switches come with a default username and password,it’s sort of like a ‘guest account’

Donald Young

Donald Young

How do you HTTP into a switch?

Harry

Harry

With a Web-Interface. Just like you HTTP into the configuration file of your home router.

Jake

Jake

Access gained through HTTP with default user/pass in this case seems more plausible than someone gaining physical access, bringing a device to connect to the console port, and resetting the switch to then be able to re-configure it.