Assuming an attacker wants to penetrate John's network, which of the following options is he likely to choose?