Which of the following functions can be added to the authorization component of AAA to enable the principal of least privilege with flexibility?
A software developer for an IoT device company is creating software to enhance the capabilities of his company's security cameras. He wants the end users to be confident that the software they are downloading from his company's support site is legitimate. Which of the following tools or techniques should he utilize?
Network filters based on Ethernet burned-in-addresses are vulnerable to which of the following attacks?
An IoT device has many sensors on it and that sensor data is sent to the cloud. An IoT security practitioner should be sure to do which of the following in regard to that sensor data?
An IoT service collects massive amounts of data and the developer is encrypting the data, forcing administrative users to authenticate and be authorized. The data is being disposed of properly and on a timely basis. However, which of the following countermeasures is the developer most likely overlooking?