View Mode
Q: 11
An IoT device which allows unprotected shell access via console ports is most vulnerable to which of the following risks?
Options
Q: 12
A hacker was able to generate a trusted certificate that spoofs an IoT-enabled security camera's management portal. Which of the following is the most likely cause of this exploit?
Options
Q: 13
Accompany collects and stores sensitive data from thousands of IoT devices. The company's IoT security administrator is concerned about attacks that compromise confidentiality. Which of the following attacks is the security administrator concerned about? (Choose two.)
Options
Q: 14
A developer is coding for an IoT product in the healthcare sector. What special care must the developer take?
Options
Q: 15
An IoT systems administrator needs to be able to detect packet injection attacks. Which of the follow methods or technologies is the administrator most likely to implement?
Options
Q: 16
An IoT system administrator discovers that hackers are using rainbow tables to compromise user accounts on their cloud management portal. What should the administrator do in order to mitigate this risk?
Options
Q: 17
Passwords should be stored…
Options
Q: 18
In order to minimize the risk of abusing access controls, which of the following is a good example of granular access control implementation?
Options
Q: 19
Which of the following techniques protects the confidentiality of the information stored in databases?
Options
Q: 20
An IoT system administrator discovers that end users are able to access administrative features on the company's IoT management portal. Which of the following actions should the administrator take to address this issue?
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE