A home invasion occurred recently in which an intruder compromised a home network and accessed a WiFI- enabled baby monitor while the baby’s parents were sleeping.
Which of the following BEST describes how the intruder accessed the monitor?
A. Outdated antivirus
B. WiFi signal strength
C. Social engineering
D. Default configuration