Embedded systems typically have limited CPU power, memory, and storage compared to general-purpose computing devices. Implementing advanced security features like encryption, intrusion detection, or machine learning-based anomaly detection can be computationally intensive.
Facility automation systems frequently demand low-latency responses to ensure safe and efficient operations. Introducing additional security processing can delay critical operations, potentially leading to system inefficiencies or failures. Security software may not be optimized for the specific hardware architectures of embedded systems.
Ans is A. They are constrained by available compute. Embedded systems typically have limited processing power, memory, and storage resources, which restrict their ability to support more advanced security measures or software updates. These constraints can make it difficult to implement newer security protocols, updates, or patches that require more computational resources than the system can provide.
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.CAS-004 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
grelaman
6 months, 3 weeks agoBright07
7 months, 1 week ago