Question 26
An IoT system administrator wants to mitigate the risk of rainbow table attacks. Which of the following methods or technologies can the administrator implement in order to address this concern?
Question 27
An IoT integrator wants to deploy an IoT gateway at the Edge and have it connect to the cloud via API. In order to minimize risk, which of the following actions should the integrator take before integration?
Question 28
A security practitioner wants to encrypt a large datastore. Which of the following is the BEST choice to implement?
Question 29
An IoT security practitioner should be aware of which common misconception regarding data in motion?
Question 30
If an attacker were able to gain access to a user's machine on your network, which of the following actions would she most likely take next?