An IoT manufacturer wants to ensure that their web-enabled cameras are secured against brute force password attacks.
Which of the following technologies or protocols could they implement?
A . URL filtering policies
B. Account lockout policies
C. Software encryption
D. Buffer overflow prevention
Answer: B
Latest ITS-110 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund