Passwords should be stored…
Passwords should be stored…A . For no more than 30 days. B. Only in cleartext. C. As a hash value. D. Inside a digital certificate.View AnswerAnswer: C Explanation: Reference: https://snyk.io/learn/password-storage-best-practices/
Which of the following is the BEST encryption standard to implement for securing bulk data?
Which of the following is the BEST encryption standard to implement for securing bulk data?A . Triple Data Encryption Standard (3DES) B. Advanced Encryption Standard (AES) C. Rivest Cipher 4 (RC4) D. Elliptic curve cryptography (ECC)View AnswerAnswer: B
Which of the following is the least secure method to use for implementation?
An OT security practitioner wants to implement two-factor authentication (2FA). Which of the following is the least secure method to use for implementation?A . Out-of-band authentication (OOBA) B. 2FA over Short Message Service (SMS) C. Authenticator Apps for smartphones D. Fast Identity Online (FIDO) Universal 2nd Factor (U2F) USB keyView...
What is one popular network protocol that is usually enabled by default on home routers that creates a large attack surface?
What is one popular network protocol that is usually enabled by default on home routers that creates a large attack surface?A . Open virtual private network (VPN) B. Universal Plug and Play (UPnP) C. Network Address Translation (NAT) D. Domain Name System Security Extensions (DNSSEC)View AnswerAnswer: B Explanation: Reference: https://phoenixnap.com/blog/what-is-upnp
Which of the following tools or techniques is used by software developers to maintain code, but also used by hackers to maintain control of a compromised system?
Which of the following tools or techniques is used by software developers to maintain code, but also used by hackers to maintain control of a compromised system?A . Disassembler B. Backdoor C. Debugger D. Stack pointerView AnswerAnswer: B
If a site administrator wants to improve the secure access to a cloud portal, which of the following would be the BEST countermeasure to implement?
If a site administrator wants to improve the secure access to a cloud portal, which of the following would be the BEST countermeasure to implement?A . Require frequent password changes B. Mandate multi-factor authentication (MFA) C. Utilize role-based access control (RBAC) D. Require separation of dutiesView AnswerAnswer: C
Which of the following tools or techniques should he utilize?
A software developer for an IoT device company is creating software to enhance the capabilities of his company's security cameras. He wants the end users to be confident that the software they are downloading from his company's support site is legitimate. Which of the following tools or techniques should he...
Which of the following attacks is this person attempting?
A hacker wants to record a live session between a user and a host in hopes that parts of the datastream can be used to spoof the session. Which of the following attacks is this person attempting?A . Fuzzing B. Session replay C. Bit flipping D. Reverse shellView AnswerAnswer: B
Which of the following technologies or protocols could they implement?
An IoT manufacturer wants to ensure that their web-enabled cameras are secured against brute force password attacks. Which of the following technologies or protocols could they implement?A . URL filtering policies B. Account lockout policies C. Software encryption D. Buffer overflow preventionView AnswerAnswer: B
According to the General Data Protection Regulation (GDPR), when is an organization required to delete this data?
A user grants an IoT manufacturer consent to store personally identifiable information (PII). According to the General Data Protection Regulation (GDPR), when is an organization required to delete this data?A . Within ninety days after collection, unless required for a legal proceeding B. Within thirty days of a user's written...