Question 21
An IoT device has many sensors on it and that sensor data is sent to the cloud. An IoT security practitioner should be sure to do which of the following in regard to that sensor data?
Question 22
An IoT developer has endpoints that are shipped to users in the field. Which of the following best practices must be implemented for using default passwords after delivery?
Question 23
A DevOps engineer wants to provide secure network services to an IoT/cloud solution. Which of the following countermeasures should be implemented to mitigate network attacks that can render a network useless?
Question 24
In order to successfully perform a man-in-the-middle (MITM) attack against a secure website, which of the following could be true?
Question 25
Which of the following describes the most significant risk created by implementing unverified certificates on an IoT portal?