Question 6 of 100An IoT security architect wants to implement Bluetooth between two nodes. The Elliptic Curve Diffie-Hellman (ECDH) cipher suite has been identified as a requirement. Which of the following Bluetooth versions can meet this requirement?
Correct Answer: D
Question 7 of 100An IoT security administrator realizes that when he attempts to visit the administrative website for his devices, he is sent to a fake website. To which of the following attacks has he likely fallen victim?
Correct Answer: D
Question 8 of 100Network filters based on Ethernet burned-in-addresses are vulnerable to which of the following attacks?
Correct Answer: A
Question 9 of 100An IoT security architect needs to minimize the security risk of a radio frequency (RF) mesh application. Which of the following might the architect consider as part of the design?
Correct Answer: B
Question 10 of 100Which of the following methods is an IoT portal administrator most likely to use in order to mitigate Distributed Denial of Service (DDoS) attacks?