Q1. A software developer for an IoT device company is creating software to enhance the capabilities of his company's security cameras. He wants the end users to be confident that the software they are downloading from his company's support site is legitimate. Which of the following tools or techniques should he utilize?
A.Data validation
B. Interrupt analyzer
C. Digital certificate
D. Pseudocode
Correct Answer: C
Q2. Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?
A.Account lockout policy
B. Automated security logging
C. Role-based access control
D. Secure password recovery
Correct Answer: A
Q3. An IoT software developer strives to reduce the complexity of his code to allow for efficient design and implementation. Which of the following terms describes the design principle he is implementing?
A.Calibration
B. Demodulation
C. Encapsulation
D. Abstraction
Correct Answer: D
Q4. An IoT system administrator wants to mitigate the risk of rainbow table attacks. Which of the following methods or technologies can the administrator implement in order to address this concern?
A.Enable account lockout
B. Enable account database encryption
C. Require frequent password changes
D. Require complex passwords
Correct Answer: B
$ 39
Reviews
There are no reviews yet.