Two weeks after installation, a network technician is now unable to log onto any of the newly installed company switches. The technician suspects that a malicious
user may have changed the switches’ settings before they were installed in secure areas. Which of the following is the MOST likely way in which the malicious user
gained access to the switches?

A.
Via SSH using the RADIUS shared secret
B.
Via HTTP using the default username and password
C.
Via console using the administrator’s password
D.
Via SNMP using the default RO community
Explanation:
A new network switch is accessed via HTTP to perform the initial configuration. The username and password used is a factory default.
doesn’t make any sense the question is referring to the switch LATER being placed in a SECURE location. So why are all the answers showing NON-physical ways to access the switch
0
0