ECCouncil EC-Council Certified Security Specialist (ECSSv10)Exam ECSS Question # 3 Topic 1 Discussion

ECCouncil EC-Council Certified Security Specialist (ECSSv10)Exam ECSS Question # 3 Topic 1 Discussion

ECSS Exam Topic 1 Question 3 Discussion:
Question #: 3
Topic #: 1

James is a professional hacker attempting to gain access to an industrial system through a remote control device. In this process, he used a specially designed radio transceiver device to sniff radio commands and inject arbitrary code into the firmware of the remote controllers to maintain persistence.

Which of the following attacks is performed by James in the above scenario?


A.

Malicious reprogramming attack


B.

Re pairing with a malicious RF controller


C.

Command injection


D.

Abusing reprogramming attack


Get Premium ECSS Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.