Which two types of IoT firmware vulnerabilities are caused by the use of default or weak login credentials? (Choose two.)
- distributed denial of Service (DDoS)
- back door installation
- out-of-date firmware
- default credentials
- buffer overflow
Explanation: Most general IoT attacks and distributed denial-of-service (DDoS) attacks are made possible via the use of default or weak login credentials.
Exam with this question: IoT Sec 1.1 Fundamentals: IoT Security Final Exam Answers
Please login or Register to submit your answer