Apart from option A being right, my understanding, option D is right as well.
Refer to the following URL as to why Option D is right.
https://www.darkreading.com/vulnerabilities---threats/cryptographic-key-reuse-remains-widespread-in-embedded-products/d/d-id/1326826#:~:text=Cryptographic%20Key%20Reuse%20Remains%20Widespread%20In%20Embedded%20Products&text=From%203.2%20million%20devices%20in,stands%20at%204.7%20million%20currently.
b - This is referred to as an Internet of Things (IoT) botnet
a - IoT devices lack a built-in secure firmware update mechanism. Without such a mechanism, however, critical security vulnerabilitiescannot be fixed, and IoT devices can become a permanent liability, as demonstrated by recent large-scale attacks.
Same why would there be collision issues...that's more of a hash problem no? I'm going with A and B on the exam
upvoted 2 times
...
...
This section is not available anymore. Please use the main Exam Page.SY0-501 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
idoIL
Highly Voted 4 years, 4 months agoekinzaghi
3 years, 9 months agoHerbie1995
4 years, 4 months agoSQLinjector
4 years, 4 months agomonkeyyyyy
Most Recent 3 years, 10 months agoskuppper_12
3 years, 11 months agoskuppper_12
3 years, 11 months agomeg999
4 years, 2 months agoMikeDuB
4 years, 4 months agoexiledwl
4 years, 4 months ago