EMERGING TRENDS IN COMPUTING
INTERNET OF THINGS IOT
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Malicious node takes advantage of failure of a legitimate node. ○ The factual link takes a diversion through the malicious node for all its future communication, resulting in data loss. What is the IOT security Attack described?
|
External Attacks
|
|
Wormhole Attacks
|
|
Sewage Pool Attacks
|
|
Selective forwarding Attacks
|
|
Witch Attacks
|
Explanation:
There is 1 question to complete.