A user is concerned that an attacker may have gained remote access to an IoT device and is executing malicious commands. Which type of vulnerability best describes this situation?

IT Questions BankCategory: IoT SecurityA user is concerned that an attacker may have gained remote access to an IoT device and is executing malicious commands. Which type of vulnerability best describes this situation?

A user is concerned that an attacker may have gained remote access to an IoT device and is executing malicious commands. Which type of vulnerability best describes this situation?

  • distributed denial-of-service (DDoS)
  • buffer overflow
  • out-of-date firmware
  • backdoor installation

Explanation: A backdoor is usually installed by an attacker after the attacker gains remote access to an IoT device. The attacker could then execute malicious commands on the device remotely from anywhere in the world.

Exam with this question: IoT Security 1.1 Chapter 3 Quiz Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x