Questions
Let's practice what we have learned in this chapter by answering the following questions:
- Which of these is not a security best practice before installing an ESP32 device in the field?
A. Starting a secure web server on ESP32
B. Ensuring there are no GPIO pins or JTAG ports exposed
C. Enabling secure boot
D. Flash encryption
- Which of these would not be desirable if you want to restrict access to the private part of an asymmetric key pair?
A. Integrating with a Microchip ATECC608A
B. Integrating with an Optiga TrustX
C. Using an ESP32-WROOM-32SE
D. Embedding the key in the encrypted flash
- Which feature of application firmware is important after installing devices in the field in terms of patching discovered vulnerabilities?
A. Secure boot
B. Flash encryption
C. TLS communication
D. OTA updates
- Which of these events doesn't happen during a TLS handshake?
A. Exchanging supported cipher suites
B. Secure data exchange
C. Certificate authentication
D. Symmetric key...