Created by
passquestion20214Teacher
Certified Internet of Things Security Practitioner (CIoTSP)
Terms in this set (12)
A DevOps engineer wants to provide secure network services to an IoT/cloud solution. Which of the following countermeasures should be implemented to mitigate network attacks that can render a network useless?A.Network firewallB.Denial of Service (DoS)/Distributed Denial of Service (DDoS) mitigationC.Web application firewall (WAF)D.Deep Packet Inspection (DPI)
An IoT systems administrator wants to ensure that all data stored on remote IoT gateways is unreadable. Which of the following technologies is the administrator most likely to implement?A.Secure Hypertext Transmission Protocol (HTTPS)B.Internet Protocol Security (IPSec)C.Triple Data Encryption Standard (3DES)D.Message Digest 5 (MD5)
An IoT developer discovers that clients frequently fall victim to phishing attacks. What should the developer do in order to ensure that customer accounts cannot be accessed even if the customer's password has been compromised?A.Implement two-factor authentication (2FA)B.Enable Kerberos authenticationC.Implement account lockout policiesD.Implement Secure Lightweight Directory Access Protocol (LDAPS)
An IoT security architect needs to minimize the security risk of a radio frequency (RF) mesh application. Which of the following might the architect consider as part of the design?A. Make pairing between nodes very easy so that troubleshooting is reduced.B. Encrypt data transmission between nodes at the physical/logical layers.C. Prevent nodes from being rejected to keep the value of the network as high as possible.D. Allow implicit trust of all gateways since they are the link to the internet.
Other sets by this creator
Verified questions
Other Quizlet sets
1/3