A routine visit to investigate a report of poor network performance at a remote site indicates the
network router has been replaced by a combined router/wireless access point. No one will admit to
installing the access point, and it was left operating in default configuration. What should be the
response to this situation? Select three.

A.
treat this as a security breach with potential unauthorized network access
B.
the original hardware configuration should be restored
C.
wait for the formal submission of a configuration control change request
D.
the person responsible for hardware change should be identified, and they should be reminded
of Security Policy
E.
assume the performance problem is due to new consumer-class router/AP, and document for
future reference