CertNexus Certified Internet of Things Security Practitioner (CIoTSP) ITS-110 Question # 27 Topic 3 Discussion
ITS-110 Exam Topic 3 Question 27 Discussion:
Question #: 27
Topic #: 3
An IoT developer wants to ensure that their cloud management portal is protected against compromised end-user credentials. Which of the following technologies should the developer implement?
A.
An authentication policy that requires a password at initial logon, and a second password in order to access advanced features.
B.
An authentication policy which requires user passwords to include twelve characters, including uppercase, lowercase, and special characters.
C.
An authentication policy that requires a user to provide a strong password and on-demand token delivered via SMS.
D.
An authentication policy which requires two random tokens generated by a hardware device.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit