An IoT system administrator discovers that hackers are using rainbow tables to compromise user accounts on their cloud management portal. What should the administrator do in order to mitigate this risk?
A. Implement robust password policies
B. Implement certificates on all login pages
C. Implement granular role-based access
D. Implement URL filtering
An IoT system administrator discovers that hackers are using rainbow tables to compromise user accounts on their cloud m
-
- Site Admin
- Posts: 899558
- Joined: Mon Aug 02, 2021 8:13 am