Which OWASP communication layer vulnerability should be researched when securing the IoT network traffic attack surface?

IT Questions BankCategory: IoT SecurityWhich OWASP communication layer vulnerability should be researched when securing the IoT network traffic attack surface?

Which OWASP communication layer vulnerability should be researched when securing the IoT network traffic attack surface?

  • injection
  • replay attack
  • unencrypted services
  • protocol fuzzing

Explanation: When securing the IoT network traffic attack surface, the following vulnerabilities should be taken into account:

  • LAN traffic
  • LAN to internet traffic
  • short range
  • nonstandard protocols
  • wireless
  • packet manipulation (protocol fuzzing)

Exam with this question: IoT Security 1.1 Chapter 4 Quiz Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments