A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select two.)
A. Guest network
B. TKIP
C. Default login
D. Outdated firmware
E. WPS
F. WEP