Q: 11
An IoT device which allows unprotected shell access via console ports is most vulnerable to which of
the following risks?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
A hacker was able to generate a trusted certificate that spoofs an IoT-enabled security camera's
management portal. Which of the following is the most likely cause of this exploit?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
Accompany collects and stores sensitive data from thousands of IoT devices. The company's IoT
security administrator is concerned about attacks that compromise confidentiality. Which of the
following attacks is the security administrator concerned about? (Choose two.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
A developer is coding for an IoT product in the healthcare sector. What special care must the
developer take?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
An IoT systems administrator needs to be able to detect packet injection attacks. Which of the follow
methods or technologies is the administrator most likely to implement?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
An IoT system administrator discovers that hackers are using rainbow tables to compromise user
accounts on their cloud management portal. What should the administrator do in order to mitigate
this risk?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
Passwords should be stored…
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
In order to minimize the risk of abusing access controls, which of the following is a good example of
granular access control implementation?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Which of the following techniques protects the confidentiality of the information stored in
databases?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
An IoT system administrator discovers that end users are able to access administrative features on
the company's IoT management portal. Which of the following actions should the administrator take
to address this issue?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2