Question 27:
Azure IoT provides a number of patterns and options to design and implement security in your IoT solutions. One of the key components of the security architecture is how the devices authenticate themselves to IoT hub. Security tokens and X.509 certificates are two ways of authentication you can choose from. Which of the following statements is not true?
Answer options:
A.Security tokens are limited in validity and in scope B.The security token method can be used without X.509 authentication C.Shared access signatures can be used to sign security tokens D.The X.509 method is appropriate for any type of devices