What configurations are most likely to have allowed an attacker to successfully compromise a wireless network? (Choose two.)

Prepare for the CompTIA A+ Core 2 Exam with flashcards and multiple choice questions complete with hints and explanations. Ace your certification!

The choice of default login configurations as a factor that could allow an attacker to successfully compromise a wireless network is accurate because many routers and access points come with default usernames and passwords that are widely known or easily guessable. When users do not change these credentials after setting up their devices, it creates a significant security vulnerability. Attackers can use automated tools to scan for networks that employ default login credentials, making it easier for them to gain unauthorized access.

Identifying common vulnerabilities, like default credentials, is crucial for securing a wireless network, as attackers actively exploit any configuration weaknesses to infiltrate systems. Changing default logins to unique, strong credentials is a fundamental practice in securing network devices.

In contrast, a guest network typically operates on a separate virtual LAN (VLAN) intended for visitors, which often has its own security measures and restrictions. TKIP, while less secure than more modern protocols like WPA2 or WPA3, is a security protocol that at least offers some level of encryption compared to using no encryption at all. WEP is an outdated security method that is well known to have multiple weaknesses, making it easier for attackers to compromise, but it is not the most common initial point of entry compared to easily accessible default credentials.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy