Which IoT malware became famous for turning devices into a botnet to attack external targets?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which IoT malware became famous for turning devices into a botnet to attack external targets?

Explanation:
The idea being tested is malware that turns insecure IoT devices into a botnet to launch attacks on external targets. Mirai fits this perfectly: it infected many IoT devices such as cameras and routers by exploiting default or weak credentials, recruited them into a large botnet, and used that network to overwhelm external targets with distributed denial-of-service traffic. Its notoriety comes from high-profile DDoS incidents (like taking down major sites) that showed how ordinary IoT devices could be weaponized at scale. Other options describe broader or different types of IoT malware—generic IoT Trojans, security-software-disabler Trojans, or destructive Trojans—that don’t center on building a botnet to attack external targets in the same famous way.

The idea being tested is malware that turns insecure IoT devices into a botnet to launch attacks on external targets. Mirai fits this perfectly: it infected many IoT devices such as cameras and routers by exploiting default or weak credentials, recruited them into a large botnet, and used that network to overwhelm external targets with distributed denial-of-service traffic. Its notoriety comes from high-profile DDoS incidents (like taking down major sites) that showed how ordinary IoT devices could be weaponized at scale. Other options describe broader or different types of IoT malware—generic IoT Trojans, security-software-disabler Trojans, or destructive Trojans—that don’t center on building a botnet to attack external targets in the same famous way.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy