Watch this video on YouTube
In which of the following attacks does an attacker use a malicious script to exploit poorly patched vulnerabilities in an IoT device?