Which OWASP communication layer vulnerability should be researched when securing the IoT network traffic attack surface?

IT Questions BankCategory: IoT SecurityWhich OWASP communication layer vulnerability should be researched when securing the IoT network traffic attack surface?

Which OWASP communication layer vulnerability should be researched when securing the IoT network traffic attack surface?

  • injection
  • replay attack
  • unencrypted services
  • protocol fuzzing

Explanation: When securing the IoT network traffic attack surface, the following vulnerabilities should be taken into account:

  • LAN traffic
  • LAN to internet traffic
  • short range
  • nonstandard protocols
  • wireless
  • packet manipulation (protocol fuzzing)

More Questions: IoT Security 1.1 Chapter 4 Quiz Answers


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x