Q: 1
A web administrator is concerned about injection attacks. Which of the following mitigation
techniques should the web administrator implement?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
A web application is connected to an IoT endpoint. A hacker wants to steal data from the connection
between them. Which of the following is NOT a method of attack that could be used to facilitate
stealing data?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Network filters based on Ethernet burned-in-addresses are vulnerable to which of the following
attacks?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
An IoT integrator wants to deploy an IoT gateway at the Edge and have it connect to the cloud via
API. In order to minimize risk, which of the following actions should the integrator take before
integration?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
An IoT developer wants to ensure that their cloud management portal is protected against
compromised end-user credentials. Which of the following technologies should the developer
implement?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
An IoT security administrator realizes that when he attempts to visit the administrative website for
his devices, he is sent to a fake website. To which of the following attacks has he likely fallen victim?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
An embedded engineer wants to implement security features to be sure that the IoT gateway under
development will only load verified images. Which of the following countermeasures could be used
to achieve this goal?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
Recently, you purchased a smart watch from Company
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
An IoT software developer wants the users of her software tools to know if they have been modified
by someone other than her. Which of the following tools or techniques should she use?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2