List of questions
Related questions
Question 240 - 312-50v12 discussion
Richard, an attacker, aimed to hack loT devices connected to a target network. In this process.
Richard recorded the frequency required to share information between connected devices. After obtaining the frequency, he captured the original data when commands were initiated by the connected devices. Once the original data were collected, he used free tools such as URH to segregate the command sequence. Subsequently, he started injecting the segregated command sequence on the same frequency into the loT network, which repeats the captured signals of the devices. What Is the type of attack performed by Richard In the above scenario?
A.
Side-channel attack
B.
Replay attack
C.
CrypTanalysis attack
D.
Reconnaissance attack
Your answer:
0 comments
Sorted by
Leave a comment first