Q: 2
An IoT engineer is responsible for security at an organization. Humans and machines need to be
allowed to access services like database or compute on AWS. The engineer decides to implement
dynamic secrets.
Which method helps to get this implementation accurate from a security point of view?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.