An IoT developer has endpoints that are shipped to users in the field. Which of the following best practices must be implemented for using default passwords after delivery?
B all the way! Forced password change on first login is like putting a lock on the barn door after the horse has escaped. But hey, better late than never, am I right?
Hmm, I'd say D. Protecting against account enumeration is crucial. Can't have those hackers trying every combination until they get in, right? That's just asking for trouble.
I'd go with C. Granular role-based access is key to keeping those IoT endpoints secure. No need for Karen in accounting to have admin privileges, you know?
Leonida
2 months agoGilma
22 days agoAdell
23 days agoStephen
1 months agoVeronica
2 months agoKirby
2 months agoShelba
1 months agoFrancesco
1 months agoLuke
1 months agoNobuko
2 months agoLindsay
2 months agoKanisha
2 months agoCharlette
2 months agoDeandrea
28 days agoElmira
1 months agoLaurel
1 months agoSanjuana
2 months ago