Multiple Choice
An IoT engineer is responsible for security at an organization. Humans and machines need to be allowed to access services like database or compute on AWS. The engineer decides to implement dynamic secrets. Which method helps to get this implementation accurate from a security point of view?
A) Create a central secret system for humans and machine to obtain very short-lived dynamic secrets to access any service.
B) Humans cannot be trusted, and each time they authenticate they should be issued with dynamic secrets. Machines can be trusted, and they can be issued with static credentials.
C) Maintain a different service associated to secret systems to issue access.
D) After a user is authenticated by any trusted system, the user can be trusted to use any service.
Correct Answer:

Verified
Correct Answer:
Verified
Q12: Which action should be taken when a
Q13: When constructing a Python script for data
Q14: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q15: Which method defines the integration of Cisco
Q16: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q18: Which lightweight protocol is used to send
Q19: Which two states are applications expected to
Q20: The environment for an Industrial IoT project
Q21: As part of an IoT project, an
Q22: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the