Skip survey header

IoT Security School with Dan Sullivan 2016

Page 1 Questions

1. Which of the following modes of interaction may be used by IoT devices?
2. Authenticating IoT devices mitigates what type of security threat?
3. Which operation should be performed on startup of an IoT device?
4. Anomalies in communications to and from IoT devices may indicate what types of problems?
5. Users and roles associated with managing IoT devices should be assigned privileges according to: