An IoT service collects massive amounts of data and the developer is encrypting the data, forcing administrative users to authenticate and be authorized. The data is being disposed of properly and on a timely basis. However, which of the following countermeasures is the developer most likely overlooking?
An IoT system administrator wants to mitigate the risk of rainbow table attacks. Which of the following methods or technologies can the administrator implement in order to address this concern?
An IoT software developer strives to reduce the complexity of his code to allow for efficient design and implementation. Which of the following terms describes the design principle he is implementing?
Which of the following methods or technologies is most likely to be used to protect an IoT portal against protocol fuzzing?
In order to minimize the risk of abusing access controls, which of the following is a good example of granular access control implementation?
A hacker is able to extract users' names, birth dates, height, and weight from an IoT manufacturer's user portal. Which of the following types of data has been compromised?
Web forms that contain unvalidated fields are vulnerable to which of the following attacks? (Choose two.)
An IoT system administrator discovers that hackers are using rainbow tables to compromise user accounts on their cloud management portal. What should the administrator do in order to mitigate this risk?
Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?
A hacker enters credentials into a web login page and observes the server's responses. Which of the following attacks is the hacker attempting?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
CertNexus Free Exams |
---|
![]() |