I dont know if people know that, but some questions have multiple correct answers, which all give points, even if different amount. In this particular question I believe both C and D are correct. Zigbee IS a communication protocol, which is solely focused on IoT devices, which I believe is the better answer here. However selecting D would still be considered correct in my opinion, but since it is not directly linked to IoT devices as Zigbee, it would simply net you less points.
While Zigbee is a popular communication protocol used in many IoT devices due to its low power consumption and mesh networking capabilities, it’s not the first thing to consider when trying to keep the network secure.
The first thing to consider should be the communication protocols (Option D) used by the IoT devices. This is because communication protocols define how data is transmitted and received between devices, and they can provide features like encryption and authentication that are crucial for network security.
However, once you’ve chosen secure communication protocols, configuring them correctly (including Zigbee, if it’s used) is also very important for maintaining network security. Incorrect configuration can lead to vulnerabilities that could be exploited by attackers.
The correct answer is D. Communication protocols.
Here's why communication protocols should be the top priority for securing IoT networks:
Foundation for security: The protocols used for device communication determine how data is transmitted, encrypted, and authenticated, forming the basis for overall network security.
Inherent vulnerabilities: IoT devices often employ standard protocols like Wi-Fi, Bluetooth, Zigbee, and Z-Wave, which can have known vulnerabilities if not properly configured and secured.
Early decision-making: Choosing secure protocols and implementing appropriate security measures from the start is crucial, as retrofitting security later can be challenging and costly.
Addressing other options:
Z-Wave compatibility, Zigbee configuration, and network range: While important for functionality and coverage, these factors don't directly impact security to the same extent as communication protocols.
Zigbee answer is more accurate than communication protocols answer. Zigbee is a communications protocol know for automating Internet of things (IoT). Zigbee is a wireless protocol that is used to allow Smart Devices such as light bulbs, sockets, plugs, smart locks, motion sensors and door sensors to communicate with each other over a "PAN" (Personal Area Network).
When implementing automation with IoT (Internet of Things) devices, the first consideration for network security should be the communication protocols used by these devices. IoT devices often use various communication protocols to interact with each other and the network, and the security of these protocols is crucial to ensure the overall security of the network.
Some common IoT communication protocols include Wi-Fi, Bluetooth, Zigbee, Z-Wave, and LoRaWAN. Each protocol has its own security features and vulnerabilities, and it is essential to choose protocols that have strong encryption, authentication mechanisms, and secure data transmission.
By prioritizing the security of communication protocols, network administrators can mitigate the risk of unauthorized access, data breaches, and other security incidents related to IoT devices in the network. Once secure communication protocols are established, other factors like Z-Wave compatibility, network range, and Zigbee configuration can be considered as additional security measures.
"D" is correct...there are at least 12 communication protocols used by IoT, regardless of which is most common. C- is wrong, so if you are using say Blutooth you just ignore controls if choosing C.
Apply necessary security measurements
Data security and privacy are the businesses’ concerns. IoT security breaches are common and businesses need to inform their data security officer about IoT projects to ensure that data governance best practices are integrated into the project. If necessary, GDPR compliance should be considered. In addition, IoT security solutions can be integrated to minimize security breaches. Endpoint security, communication protocols, access control, encryption, and fraud management are some measures you can take to enhance data security and privacy.
When implementing automation with IoT devices, communication protocols should be considered first to keep the network secure. Communication protocols determine how devices communicate with each other and with the network. It is important to choose secure communication protocols that use encryption and authentication to prevent unauthorized access and protect the privacy of the data being transmitted. Z-Wave compatibility, network range, and Zigbee configuration are all important factors to consider, but they are secondary to the security of the communication protocols.
The question doesn't state whether a wireless network is in use or not so I would go with D.
But, let's say it was a wireless network then my answer would be B.
Why?
You gotta ensure the security of the perimeter and not let the wireless range outreach the company's area. Especially with all those IoT devices directly connected to it. Would be wise to check on that first
A short-range wireless PAN (Personal Area Network)
technology developed to support automation,
machine-to-machine communication, remote
control and monitoring of IoT devices
A short-range wireless PAN (Personal Area Network)
technology developed to support automation,
machine-to-machine communication, remote
control and monitoring of IoT devices.
supports both centralized and distributed
security models, and mesh topology
assumes that symmetric keys used are
transmitted securely (encrypted in-transit)
Isn't the first thing you need to do is to check the network range for your smart home? lol so the first thing you need to do is to check the range if all of your IoT devices are connected then apply the needed communication protocol - either Z-wave or Zigbee.
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Kashim
Highly Voted 2 years, 8 months agoAnonymousJhb
1 year, 2 months agoRanaer
Highly Voted 2 years, 5 months agoIzaholu
1 year, 11 months agoMartyByrde
1 year, 6 months agoPayu1994
Most Recent 1 year, 4 months agoalittlesmarternow
1 year, 6 months agoSoleandheel
1 year, 8 months agofercho2023
1 year, 8 months agoSTODDY69
1 year, 10 months agoApplebeesWaiter1122
1 year, 11 months agojb844
2 years, 1 month agoAttila777
2 years, 1 month agouser1234493
2 years, 2 months agoYawannawanka
2 years, 2 months agodzampar
2 years, 2 months agotutita
2 years, 2 months agoDWISE1
2 years, 3 months agoDWISE1
2 years, 3 months agoseagnull
2 years, 4 months agoDapsie
1 year, 1 month agoseagnull
2 years, 4 months agoklinkklonk
1 year, 5 months ago