A security engineer is researching the secure deployments of critical IoT devices. How does the principle of identity and access management (IAM) define security with these types of devices?
- limits which device will be the authentication server and which clients are allowed access to the network
- limits those who can access what resources and the privileges they have once they obtain access
- limits which third parties can send an access token to the resource server to make a resource request
- limits which third parties can request an access token and attempt to authenticate
Explanation: Identity and access management (IAM) is a critical IoT security principle that defines those who can access what resources and the privileges they have once they obtain access.
Exam with this question: IoT Security 1.1 Chapter 3 Quiz Answers
Please login or Register to submit your answer