exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 252 discussion

Actual exam question from CompTIA's SY0-701
Question #: 252
Topic #: 1
[All SY0-701 Questions]

Which of the following considerations is the most important regarding cryptography used in an IoT device?

  • A. Resource constraints
  • B. Available bandwidth
  • C. The use of block ciphers
  • D. The compatibility of the TLS version
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
baronvon
Highly Voted 8 months, 3 weeks ago
Selected Answer: A
A. Resource constraints Resource constraints are critical in IoT devices because these devices often have limited processing power, memory, and battery life. Cryptographic operations can be resource-intensive, so it's essential to choose algorithms and protocols that are efficient and suitable for the device's capabilities. Failing to consider resource constraints can lead to performance issues or even render the device unable to perform necessary cryptographic operations. The other options are important but generally secondary to ensuring the cryptography can operate within the device's resource limitations: B. Available bandwidth: This is relevant for data transmission but is not a primary concern for the cryptography itself. C. The use of block ciphers: Choosing between block ciphers and stream ciphers depends on the specific use case, but resource constraints take precedence. D. The compatibility of the TLS version: This is important for secure communications, but resource constraints must first be addressed to ensure that the device can support any chosen protocol.
upvoted 6 times
...
Gman530
Most Recent 8 months, 3 weeks ago
Selected Answer: A
IoT devices typically don't have a ton of resources to dedicate to encrypting/decrypting data.
upvoted 2 times
...
internslayer
9 months ago
Selected Answer: A
A: Resource Constraints
upvoted 2 times
...
nesquick0
9 months ago
Selected Answer: C
C. The use of block ciphers
upvoted 1 times
2fd1029
8 months ago
Block cipher is a concept of cryptography, not a consideration for IoT devices with regards to cryptography.
upvoted 1 times
...
...
nesquick0
9 months ago
Selected Answer: C
C. The use of block ciphers
upvoted 1 times
...
a4e15bd
9 months, 1 week ago
A is correct. IoT devices often have limited processing power, memory and battery life. This makes it crucial to choose cryptographic algorithms that are efficient and can operate within these constraints without degrading device performance.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago