A user is concerned that an attacker may have gained remote access to an IoT device and is executing malicious commands. Which type of vulnerability best describes this situation?
- distributed denial-of-service (DDoS)
- buffer overflow
- out-of-date firmware
- backdoor installation
Explanation: A backdoor is usually installed by an attacker after the attacker gains remote access to an IoT device. The attacker could then execute malicious commands on the device remotely from anywhere in the world.
More Questions: IoT Security 1.1 Chapter 3 Quiz Answers