
Answer-first summary for fast verification
Answer: Specify security requirements for the IoT devices, including secure communication protocols, device authentication, and firmware updates, while also considering the scalability and compliance needs of the deployment.
As a cybersecurity architect, it is essential to specify comprehensive security requirements for IoT workloads that include secure communication protocols to protect data in transit, device authentication mechanisms to ensure only authorized devices can connect, and the capability for regular firmware updates to address vulnerabilities. These measures must be balanced with the deployment's cost, scalability, and compliance requirements. Option B best addresses these needs by covering all critical security aspects while also considering the operational constraints. Relying solely on the manufacturer's security measures (Option D) or neglecting certain security aspects (Options A and C) can leave the deployment vulnerable to attacks and non-compliance with regulations.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
Your company is planning to deploy Internet of Things (IoT) devices in its manufacturing facility to monitor production lines and environmental conditions. The deployment must comply with industry-specific regulations requiring data protection and privacy. Given the constraints of cost efficiency, scalability for future expansion, and the need for real-time data processing, what security requirements should you specify for these IoT workloads to ensure their security? Choose the BEST option that addresses secure communication, device authentication, and the ability to update device firmware to mitigate vulnerabilities.
A
Ensure that the IoT devices have strong authentication mechanisms and data encryption, but do not consider the need for firmware updates or secure communication protocols.
B
Specify security requirements for the IoT devices, including secure communication protocols, device authentication, and firmware updates, while also considering the scalability and compliance needs of the deployment.
C
Focus solely on securing the network and endpoints used to communicate with the IoT devices, neglecting the security of the devices themselves.
D
Rely on the IoT device manufacturer's security measures and do not implement any additional security controls, assuming they will cover all necessary aspects.