Two weeks after installation, a network technician is now unable to log onto any of the newly installed company switches. The technician suspects that a malicious
user may have changed the switches’ settings before they were installed in secure areas. Which of the following is the MOST likely way in which the malicious user
gained access to the switches?
Via SSH using the RADIUS shared secret
Via HTTP using the default username and password
Via console using the administrator’s password
Via SNMP using the default RO community
A new network switch is accessed via HTTP to perform the initial configuration. The username and password used is a factory default.