rnekrasz rnekrasz 25-04-2024 Computers and Technology Answered An attacker targets a restaurant's network devices, including routers and switches. The attacker gains access to a router after reviewing the device's documentation online. Which of the following describes the most likely attack in this scenario?