Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

BCS Exam CISMP-V9 Topic 9 Question 100 Discussion

Actual exam question for BCS's CISMP-V9 exam
Question #: 100
Topic #: 9
[All CISMP-V9 Questions]

Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?

Show Suggested Answer Hide Answer
Suggested Answer: B

The deployment of end-to-end Internet of Things (IoT) solutions significantly increases the attack surface compared to traditional IT systems. This is due to the vast number of connected devices, each potentially introducing new vulnerabilities. The heterogeneity of these devices, often with varying levels of security, can lead to more entry points for cyberattacks. Additionally, the complexity of managing and securing these numerous devices, especially when they use different communication protocols and standards, exacerbates the risk. Therefore, the expansion of the attack surface is considered the greatest risk because it amplifies the potential for unauthorized access and compromises the integrity, availability, and confidentiality of information systems.


Contribute your Thoughts:

Honey
14 days ago
I still think B) is the biggest risk, but C) is definitely something to consider as well.
upvoted 0 times
...
Celestine
14 days ago
D seems tempting, but cloud-based systems can be secured. I agree that B is the greatest risk - all those IoT devices are just asking to be hacked.
upvoted 0 times
...
France
15 days ago
Haha, 'cheap' microcontrollers in A? That's a good one. I'm going with B though, the attack surface is just too huge to ignore.
upvoted 0 times
...
Lore
16 days ago
Hmm, I'm not sure. The use of proprietary protocols in C could also be a major issue, making it harder to secure the system. But B does seem like the biggest overall risk.
upvoted 0 times
Dyan
2 days ago
B) Much larger attack surface than traditional IT systems.
upvoted 0 times
...
Latosha
4 days ago
A) Use of 'cheap' microcontroller based sensors.
upvoted 0 times
...
Viva
8 days ago
C) Use of proprietary networking protocols between nodes.
upvoted 0 times
...
Tashia
11 days ago
B) Much larger attack surface than traditional IT systems.
upvoted 0 times
...
Jacklyn
13 days ago
A) Use of 'cheap' microcontroller based sensors.
upvoted 0 times
...
...
Raina
17 days ago
That's a good point, Marshall. Proprietary protocols could make it harder to secure the system.
upvoted 0 times
...
Marshall
21 days ago
I believe C) Use of proprietary networking protocols between nodes could also pose a risk.
upvoted 0 times
...
Dana
27 days ago
I think the answer is B. A larger attack surface due to the interconnected nature of IoT systems is a huge risk. All those endpoints are vulnerable entry points for hackers.
upvoted 0 times
Jackie
8 days ago
B) Much larger attack surface than traditional IT systems.
upvoted 0 times
...
Felicia
13 days ago
A) Use of 'cheap' microcontroller based sensors.
upvoted 0 times
...
...
Honey
28 days ago
I agree with Raina, having a larger attack surface is definitely a major concern.
upvoted 0 times
...
Raina
29 days ago
I think the greatest risk is B) Much larger attack surface than traditional IT systems.
upvoted 0 times
...

Save Cancel