Microsoft Cybersecurity Architect Expert SC-100

Microsoft Cybersecurity Architect Expert SC-100

Get started today

Ultimate access to all questions.


Your organization is planning to deploy a wide range of IoT devices and embedded systems across various operational environments, including manufacturing floors and remote field locations. As a cybersecurity architect, you are tasked with specifying the security requirements for these devices to ensure they are protected against potential threats. Given the diversity of the devices and their environments, which of the following approaches BEST addresses the security considerations for these IoT devices and embedded systems? (Choose one)




Explanation:

The BEST approach is to conduct a thorough risk assessment for each type of IoT device and embedded system, considering factors such as the sensitivity of data, potential attack vectors, and environmental risks, to tailor security measures accordingly. This approach ensures that the security measures are appropriate for the specific risks associated with each device and its environment. Option A is incorrect because it overlooks the importance of securing the devices themselves and the data at rest. Option B is incorrect because a one-size-fits-all approach may not adequately address the unique security needs of different devices and environments. Option D is impractical and could unnecessarily delay the benefits of deploying IoT devices and embedded systems.