Which of the following compromises Internet-connected devices and makes them vulnerable to becoming part
of a botnet? (Choose two.)
A. Deauthentication attack
B. Malware infection
C. IP spoofing
D. Firmware corruption
E. Use of default credentials
F. Dictionary attack
of a botnet? (Choose two.)
A. Deauthentication attack
B. Malware infection
C. IP spoofing
D. Firmware corruption
E. Use of default credentials
F. Dictionary attack