exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 909 discussion

Actual exam question from CompTIA's SY0-501
Question #: 909
Topic #: 1
[All SY0-501 Questions]

Which of the following impacts are associated with vulnerabilities in embedded systems? (Choose two.)

  • A. Repeated exploitation due to unpatchable firmware
  • B. Denial of service due to an integrated legacy operating system.
  • C. Loss of inventory accountability due to device deployment
  • D. Key reuse and collision issues due to decentralized management.
  • E. Exhaustion of network resources resulting from poor NIC management.
Show Suggested Answer Hide Answer
Suggested Answer: AD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
idoIL
Highly Voted 4 years, 4 months ago
A and B?
upvoted 25 times
ekinzaghi
3 years, 9 months ago
its obvious if an OS doesnt receive the adequate patches it becomes obsolete and easily regarded a legacy system
upvoted 1 times
...
Herbie1995
4 years, 4 months ago
thats what i would of went for?
upvoted 1 times
SQLinjector
4 years, 4 months ago
same here, the question is about the impacts. Only A and B are security-related impacts on those devices
upvoted 2 times
...
...
...
monkeyyyyy
Most Recent 3 years, 10 months ago
Is there anyone here verify the answer before it's published?
upvoted 1 times
...
skuppper_12
3 years, 11 months ago
Apart from option A being right, my understanding, option D is right as well. Refer to the following URL as to why Option D is right. https://www.darkreading.com/vulnerabilities---threats/cryptographic-key-reuse-remains-widespread-in-embedded-products/d/d-id/1326826#:~:text=Cryptographic%20Key%20Reuse%20Remains%20Widespread%20In%20Embedded%20Products&text=From%203.2%20million%20devices%20in,stands%20at%204.7%20million%20currently.
upvoted 1 times
...
skuppper_12
3 years, 11 months ago
Another site lists the options B and E
upvoted 1 times
...
meg999
4 years, 2 months ago
b - This is referred to as an Internet of Things (IoT) botnet a - IoT devices lack a built-in secure firmware update mechanism. Without such a mechanism, however, critical security vulnerabilitiescannot be fixed, and IoT devices can become a permanent liability, as demonstrated by recent large-scale attacks.
upvoted 3 times
...
MikeDuB
4 years, 4 months ago
I don't get why it would be D...
upvoted 1 times
exiledwl
4 years, 4 months ago
Same why would there be collision issues...that's more of a hash problem no? I'm going with A and B on the exam
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago