exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 255 discussion

Actual exam question from CompTIA's SY0-601
Question #: 255
Topic #: 1
[All SY0-601 Questions]

When implementing automation with IoT devices, which of the following should be considered FIRST to keep the network secure?

  • A. Z-Wave compatibility
  • B. Network range
  • C. Zigbee configuration
  • D. Communication protocols
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Kashim
Highly Voted 2 years, 8 months ago
Selected Answer: D
I guess communication protocols is the best option here.
upvoted 25 times
AnonymousJhb
1 year, 2 months ago
definitely not C. I have setup an entire azure iot solution and the focus was on MQTT, AMQP & HTTPS.
upvoted 3 times
...
...
Ranaer
Highly Voted 2 years, 5 months ago
Selected Answer: C
I dont know if people know that, but some questions have multiple correct answers, which all give points, even if different amount. In this particular question I believe both C and D are correct. Zigbee IS a communication protocol, which is solely focused on IoT devices, which I believe is the better answer here. However selecting D would still be considered correct in my opinion, but since it is not directly linked to IoT devices as Zigbee, it would simply net you less points.
upvoted 19 times
Izaholu
1 year, 11 months ago
Are you saying if C is picked, instead of D, u will still be marked correctly for d exam?
upvoted 5 times
MartyByrde
1 year, 6 months ago
No, that would give us a 50 percent chance of getting questions right......
upvoted 3 times
...
...
...
Payu1994
Most Recent 1 year, 4 months ago
While Zigbee is a popular communication protocol used in many IoT devices due to its low power consumption and mesh networking capabilities, it’s not the first thing to consider when trying to keep the network secure. The first thing to consider should be the communication protocols (Option D) used by the IoT devices. This is because communication protocols define how data is transmitted and received between devices, and they can provide features like encryption and authentication that are crucial for network security. However, once you’ve chosen secure communication protocols, configuring them correctly (including Zigbee, if it’s used) is also very important for maintaining network security. Incorrect configuration can lead to vulnerabilities that could be exploited by attackers.
upvoted 3 times
...
alittlesmarternow
1 year, 6 months ago
Selected Answer: D
The correct answer is D. Communication protocols. Here's why communication protocols should be the top priority for securing IoT networks: Foundation for security: The protocols used for device communication determine how data is transmitted, encrypted, and authenticated, forming the basis for overall network security. Inherent vulnerabilities: IoT devices often employ standard protocols like Wi-Fi, Bluetooth, Zigbee, and Z-Wave, which can have known vulnerabilities if not properly configured and secured. Early decision-making: Choosing secure protocols and implementing appropriate security measures from the start is crucial, as retrofitting security later can be challenging and costly. Addressing other options: Z-Wave compatibility, Zigbee configuration, and network range: While important for functionality and coverage, these factors don't directly impact security to the same extent as communication protocols.
upvoted 1 times
...
Soleandheel
1 year, 8 months ago
Zigbee answer is more accurate than communication protocols answer. Zigbee is a communications protocol know for automating Internet of things (IoT). Zigbee is a wireless protocol that is used to allow Smart Devices such as light bulbs, sockets, plugs, smart locks, motion sensors and door sensors to communicate with each other over a "PAN" (Personal Area Network).
upvoted 2 times
...
fercho2023
1 year, 8 months ago
Option C. Check this website : "https://payatu.com/blog/zigbee-security-101/"
upvoted 2 times
...
STODDY69
1 year, 10 months ago
I picked D but can someone tell me why it isn't B. Network range security: how far is the rf passing through walls of outer perimeter, placement etc.
upvoted 2 times
...
ApplebeesWaiter1122
1 year, 11 months ago
Selected Answer: D
When implementing automation with IoT (Internet of Things) devices, the first consideration for network security should be the communication protocols used by these devices. IoT devices often use various communication protocols to interact with each other and the network, and the security of these protocols is crucial to ensure the overall security of the network. Some common IoT communication protocols include Wi-Fi, Bluetooth, Zigbee, Z-Wave, and LoRaWAN. Each protocol has its own security features and vulnerabilities, and it is essential to choose protocols that have strong encryption, authentication mechanisms, and secure data transmission. By prioritizing the security of communication protocols, network administrators can mitigate the risk of unauthorized access, data breaches, and other security incidents related to IoT devices in the network. Once secure communication protocols are established, other factors like Z-Wave compatibility, network range, and Zigbee configuration can be considered as additional security measures.
upvoted 10 times
...
jb844
2 years, 1 month ago
"D" is correct...there are at least 12 communication protocols used by IoT, regardless of which is most common. C- is wrong, so if you are using say Blutooth you just ignore controls if choosing C.
upvoted 1 times
...
Attila777
2 years, 1 month ago
Apply necessary security measurements Data security and privacy are the businesses’ concerns. IoT security breaches are common and businesses need to inform their data security officer about IoT projects to ensure that data governance best practices are integrated into the project. If necessary, GDPR compliance should be considered. In addition, IoT security solutions can be integrated to minimize security breaches. Endpoint security, communication protocols, access control, encryption, and fraud management are some measures you can take to enhance data security and privacy.
upvoted 1 times
...
user1234493
2 years, 2 months ago
When implementing automation with IoT devices, COMMUNICATION PROTOCOLS should be considered first to keep the network secure.
upvoted 2 times
...
Yawannawanka
2 years, 2 months ago
Selected Answer: D
When implementing automation with IoT devices, communication protocols should be considered first to keep the network secure. Communication protocols determine how devices communicate with each other and with the network. It is important to choose secure communication protocols that use encryption and authentication to prevent unauthorized access and protect the privacy of the data being transmitted. Z-Wave compatibility, network range, and Zigbee configuration are all important factors to consider, but they are secondary to the security of the communication protocols.
upvoted 3 times
...
dzampar
2 years, 2 months ago
Selected Answer: D
The question doesn't state whether a wireless network is in use or not so I would go with D. But, let's say it was a wireless network then my answer would be B. Why? You gotta ensure the security of the perimeter and not let the wireless range outreach the company's area. Especially with all those IoT devices directly connected to it. Would be wise to check on that first
upvoted 1 times
...
tutita
2 years, 2 months ago
Selected Answer: B
to be considered first I think it will be the network range, and then the rest? I will go for B
upvoted 1 times
...
DWISE1
2 years, 3 months ago
A short-range wireless PAN (Personal Area Network) technology developed to support automation, machine-to-machine communication, remote control and monitoring of IoT devices
upvoted 1 times
...
DWISE1
2 years, 3 months ago
A short-range wireless PAN (Personal Area Network) technology developed to support automation, machine-to-machine communication, remote control and monitoring of IoT devices. supports both centralized and distributed security models, and mesh topology assumes that symmetric keys used are transmitted securely (encrypted in-transit)
upvoted 1 times
...
seagnull
2 years, 4 months ago
Selected Answer: B
Isn't the first thing you need to do is to check the network range for your smart home? lol so the first thing you need to do is to check the range if all of your IoT devices are connected then apply the needed communication protocol - either Z-wave or Zigbee.
upvoted 2 times
Dapsie
1 year, 1 month ago
The keyword is "secure".
upvoted 1 times
...
seagnull
2 years, 4 months ago
just passed the exam (815) and i chose Network Range :)
upvoted 2 times
klinkklonk
1 year, 5 months ago
Which means nothing as it could have been one that you got wrong.
upvoted 3 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...