Which of the following attacks utilizes Media Access Control (MAC) address spoofing?
Correct Answer:
B
🗳️
In order to successfully perform a man-in-the-middle (MITM) attack against a secure website, which of the following could be true?
Correct Answer:
C
🗳️
An IoT security administrator wishes to mitigate the risk of falling victim to Distributed Denial of Service (DDoS) attacks. Which of the following mitigation strategies should the security administrator implement? (Choose two.)
Correct Answer:
DE
🗳️
An IoT security administrator is concerned about an external attacker using the internal device management local area network (LAN) to compromise his IoT devices. Which of the following countermeasures should the security administrator implement? (Choose three.)
Correct Answer:
BDG
🗳️