What is the result of an attacker rooting an IoT device?

IT Questions BankCategory: IoT SecurityWhat is the result of an attacker rooting an IoT device?

What is the result of an attacker rooting an IoT device?

  • An attacker that gains root access has limited access until the attacker installs backdoor software.
  • An attacker that gains root access will be able to read the memory of that device.
  • An attacker that gains root access is limited to local access of that device.
  • An attacker that gains root access has complete control over that device.

Explanation: An attacker that successfully roots an operating system can then read, modify, or delete any file on that system.

Exam with this question: IoT Security 1.1 Chapter 3 Quiz Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments