Question 26

An IoT system administrator wants to mitigate the risk of rainbow table attacks. Which of the following methods or technologies can the administrator implement in order to address this concern?
  • Question 27

    An IoT integrator wants to deploy an IoT gateway at the Edge and have it connect to the cloud via API. In order to minimize risk, which of the following actions should the integrator take before integration?
  • Question 28

    A security practitioner wants to encrypt a large datastore. Which of the following is the BEST choice to implement?
  • Question 29

    An IoT security practitioner should be aware of which common misconception regarding data in motion?
  • Question 30

    If an attacker were able to gain access to a user's machine on your network, which of the following actions would she most likely take next?