If an attacker were able to gain access to a user's machine on your network, which of the following actions would she most likely take next?
If an attacker were able to gain access to a user's machine on your network, which of the following actions would she most likely take next?A . Start log scrubbing B. Escalate privileges C. Perform port scanning D. Initiate reconnaissanceView AnswerAnswer: C
Which of the following algorithms should she choose?
An IoT security administrator is determining which cryptographic algorithm she should use to sign her server's digital certificates. Which of the following algorithms should she choose?A . Rivest Cipher 6 (RC6) B. Rijndael C. Diffie-Hellman (DH) D. Rivest-Shamir-Adleman (RSA)View AnswerAnswer: D
Which of the following methods should you recommend to your boss?
You work for an IoT software-as-a-service (SaaS) provider. Your boss has asked you to research a way to effectively dispose of stored sensitive customer data. Which of the following methods should you recommend to your boss?A . Crypto-shredding B. Degaussing C. Overwriting D. Physical destructionView AnswerAnswer: D
Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?
Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?A . Account lockout policy B. Automated security logging C. Role-based access control D. Secure password recoveryView AnswerAnswer: A Explanation: Reference: https://www.sciencedirect.com/topics/computer-science/account-lockout-policy#:~:text=Account%20lockout%20policies%20are%20used,twice%2C%20but%20not %20numerous%20times
An IoT service collects massive amounts of data and the developer is encrypting the data, forcing administrative users to authenticate and be authorized. The data is being disposed of properly and on a timely basis. However, which of the following countermeasures is the developer most likely overlooking?
An IoT service collects massive amounts of data and the developer is encrypting the data, forcing administrative users to authenticate and be authorized. The data is being disposed of properly and on a timely basis. However, which of the following countermeasures is the developer most likely overlooking?A . That private...