Question 21

An IoT device has many sensors on it and that sensor data is sent to the cloud. An IoT security practitioner should be sure to do which of the following in regard to that sensor data?
  • Question 22

    An IoT developer has endpoints that are shipped to users in the field. Which of the following best practices must be implemented for using default passwords after delivery?
  • Question 23

    A DevOps engineer wants to provide secure network services to an IoT/cloud solution. Which of the following countermeasures should be implemented to mitigate network attacks that can render a network useless?
  • Question 24

    In order to successfully perform a man-in-the-middle (MITM) attack against a secure website, which of the following could be true?
  • Question 25

    Which of the following describes the most significant risk created by implementing unverified certificates on an IoT portal?