A hacker enters credentials into a web login page and observes the server's responses. Which of the following attacks is the hacker attempting?
An IoT security administrator wishes to mitigate the risk of falling victim to Distributed Denial of Service (DDoS) attacks. Which of the following mitigation strategies should the security administrator implement? (Choose two.)
A security practitioner wants to encrypt a large datastore. Which of the following is the BEST choice to implement?
An IoT system administrator wants to mitigate the risk of rainbow table attacks. Which of the following methods or technologies can the administrator implement in order to address this concern?