A security engineer is researching the secure deployments of critical IoT devices. How does the principle of identity and access management (IAM) define security with these types of devices?

IT Questions BankCategory: IoT SecurityA security engineer is researching the secure deployments of critical IoT devices. How does the principle of identity and access management (IAM) define security with these types of devices?

A security engineer is researching the secure deployments of critical IoT devices. How does the principle of identity and access management (IAM) define security with these types of devices?

  • limits which device will be the authentication server and which clients are allowed access to the network
  • limits those who can access what resources and the privileges they have once they obtain access
  • limits which third parties can send an access token to the resource server to make a resource request
  • limits which third parties can request an access token and attempt to authenticate

Explanation: Identity and access management (IAM) is a critical IoT security principle that defines those who can access what resources and the privileges they have once they obtain access.

Exam with this question: IoT Security 1.1 Chapter 3 Quiz Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments