exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 774 discussion

Actual exam question from CompTIA's SY0-501
Question #: 774
Topic #: 1
[All SY0-501 Questions]

Which of the following is a security consideration for IoT devices?

  • A. IoT devices have built-in accounts that users rarely access.
  • B. IoT devices have less processing capabilities.
  • C. IoT devices are physically segmented from each other.
  • D. IoT devices have purpose-built applications.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
power21
Highly Voted 4 years, 6 months ago
Had this question on my exam. October 5, 2020 - I went with A, its the only option that was relevant to a security consideration. Horrible question btw.
upvoted 21 times
MichaelLangdon
4 years, 4 months ago
thx for the input brotha
upvoted 5 times
...
...
Eluis007
Most Recent 3 years, 5 months ago
When they are designed for residential use, IoT devices can suffer from weak defaults. They may be configured to "work" with a minimum of configuration effort. There may be recommended steps to secure the device that the customer never takes. So, A is the answer
upvoted 1 times
...
yeaggie
4 years ago
I don't see how security could play into anything else but A.
upvoted 1 times
...
bobthebuilder55110
4 years, 3 months ago
Why not B, less processing means less secure implementation of security since good security implementation take more processing power.
upvoted 1 times
...
hlwo
4 years, 7 months ago
A is correct. an example is a camera you use at home, it has an admin account already set up , and you rarely work with it.
upvoted 4 times
...
carlo479
4 years, 8 months ago
Its C. IoT devices are physically segmented from each other. Since, Iot devices are physically segmented from each other, it is difficult to provide physical security. It is as important as servers security. One should not compromise regarding physical security.
upvoted 1 times
...
babati
4 years, 8 months ago
A is probably correct: https://tech.newstatesman.com/security/uk-banning-default-passwords But: The security requirements for key usage will also determine the key's length. Longer keys are more secure, and critical processes (such as identifying the root CA) should use long keys (4096-bit). Data processing servers are likely to use 2048-bit keys, rather than 1024-bit keys, especially if there is any regulatory compliance involved. Conversely, a certificate issued to a smartphone or tablet or Internet of Things (IoT) device might need to use a shorter key to reduce the amount of CPU processing and power required for each operation using the key. RSA (Rivest Shamir Adleman) and ECC (Elliptic Curve Cryptography) algorithms have been compared for identifying the most lightweight, secure, efficient implementation in IoT. Based on the findings, the ECC algorithm outperforms RSA in a constrained environment in terms of memory requirements, energy consumption, key sizes, signature generation time, key generation and execution time, and decryption time while RSA performs better in verifying the signature and encrypting.
upvoted 3 times
...
Ibrahim_aj
4 years, 9 months ago
A is wrong, i would say D instead.
upvoted 1 times
adriantdf
4 years, 8 months ago
And the Earth is flat, because I say so. Provide the answer with an fully explanation next time.
upvoted 26 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago