The attack involves unauthorized access to IoT devices, making authentication the key concern. Strong authentication measures, such as multi-factor authentication (MFA) or device-specific credentials, can prevent attackers from gaining control. Proper authentication ensures: 1. Only authorized users or systems can access IoT devices. 2. Secure communication between devices in the IoT ecosystem. 3. Reduced risk of breaches even if other vulnerabilities exist. The lack of robust authentication exposes devices to unauthorized control, which was likely exploited in this scenario. Why Other Options Are Incorrect: • A) Confidentiality: Protects data but doesn't prevent unauthorized access to devices. • B) Availability: Ensures system uptime but doesn’t address access control. • C) Integrity: Focuses on preventing data tampering, not unauthorized access. • E) Non-repudiation: Prevents denial of actions but doesn’t secure initial access.
Select the most appropriate direct form of the given sentence.
Rahul told me he didn’t have time to go to the dispensary as he was getting la...
My brother said, "I can climb this hill in less than an hour."
Select the most appropriate direct form of the given sentence.
The policeman told the inspector that he had arrested a man for breaking the loc...
Mr. Mathur said to me, ‘How is your father?’
Select the most appropriate indirect form of the given sentence.
“What sort of a house are you looking for, Mr. Barrington?” said the house...
Select the most appropriate indirect form of the given sentence.
Walter said to David, “ I am looking forward to tomorrow’s auction.”
Select the option that expresses the given sentence in direct speech.
He asked me when I had booked the flight tickets.
I will tell him that I don’t want to join the art classes.
The saint prayed that God might pour all his blessings on the newly married couple.
Select the correct indirect/direct speech for the given sentence
Father said to son, “ what time do the schools open and close?”
...