What is the result of an attacker rooting an IoT device?
- An attacker that gains root access has limited access until the attacker installs backdoor software.
- An attacker that gains root access will be able to read the memory of that device.
- An attacker that gains root access is limited to local access of that device.
- An attacker that gains root access has complete control over that device.
Explanation: An attacker that successfully roots an operating system can then read, modify, or delete any file on that system.
Exam with this question: IoT Security 1.1 Chapter 3 Quiz Answers
Please login or Register to submit your answer