Web forms that contain unvalidated fields are vulnerable to which of the following attacks? (Choose two.)
A hacker was able to generate a trusted certificate that spoofs an IoT-enabled security camera's management portal. Which of the following is the most likely cause of this exploit?
A developer needs to implement a highly secure authentication method for an IoT web portal. Which of the following authentication methods offers the highest level of identity assurance for end users?
An IoT software developer wants the users of her software tools to know if they have been modified by someone other than her. Which of the following tools or techniques should she use?
Which of the following methods or technologies is most likely to be used to protect an IoT portal against protocol fuzzing?
A site administrator is not enforcing strong passwords or password complexity. To which of the following types of attacks is this system probably MOST vulnerable?
An IoT device which allows unprotected shell access via console ports is most vulnerable to which of the following risks?
A developer is coding for an IoT product in the healthcare sector. What special care must the developer take?
If an attacker were able to gain access to a user's machine on your network, which of the following actions would she most likely take next?
A developer needs to apply a family of protocols to mediate network access. Authentication and Authorization has been implemented properly. Which of the following is the missing component?