A. Resource constraints
Resource constraints are critical in IoT devices because these devices often have limited processing power, memory, and battery life. Cryptographic operations can be resource-intensive, so it's essential to choose algorithms and protocols that are efficient and suitable for the device's capabilities. Failing to consider resource constraints can lead to performance issues or even render the device unable to perform necessary cryptographic operations.
The other options are important but generally secondary to ensuring the cryptography can operate within the device's resource limitations:
B. Available bandwidth: This is relevant for data transmission but is not a primary concern for the cryptography itself.
C. The use of block ciphers: Choosing between block ciphers and stream ciphers depends on the specific use case, but resource constraints take precedence.
D. The compatibility of the TLS version: This is important for secure communications, but resource constraints must first be addressed to ensure that the device can support any chosen protocol.
A is correct.
IoT devices often have limited processing power, memory and battery life. This makes it crucial to choose cryptographic algorithms that are efficient and can operate within these constraints without degrading device performance.
upvoted 4 times
...
This section is not available anymore. Please use the main Exam Page.SY0-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
baronvon
Highly Voted 8 months, 3 weeks agoGman530
Most Recent 8 months, 3 weeks agointernslayer
9 months agonesquick0
9 months ago2fd1029
8 months agonesquick0
9 months agoa4e15bd
9 months, 1 week ago