Which OWASP communication layer vulnerability should be researched when securing the IoT network traffic attack surface?
- injection
- replay attack
- unencrypted services
- protocol fuzzing
Explanation: When securing the IoT network traffic attack surface, the following vulnerabilities should be taken into account:
- LAN traffic
- LAN to internet traffic
- short range
- nonstandard protocols
- wireless
- packet manipulation (protocol fuzzing)
Exam with this question: IoT Security 1.1 Chapter 4 Quiz Answers
Please login or Register to submit your answer