New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

BCS CISMP-V9 Exam - Topic 9 Question 100 Discussion

Actual exam question for BCS's CISMP-V9 exam
Question #: 100
Topic #: 9
[All CISMP-V9 Questions]

Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?

Show Suggested Answer Hide Answer
Suggested Answer: B

The deployment of end-to-end Internet of Things (IoT) solutions significantly increases the attack surface compared to traditional IT systems. This is due to the vast number of connected devices, each potentially introducing new vulnerabilities. The heterogeneity of these devices, often with varying levels of security, can lead to more entry points for cyberattacks. Additionally, the complexity of managing and securing these numerous devices, especially when they use different communication protocols and standards, exacerbates the risk. Therefore, the expansion of the attack surface is considered the greatest risk because it amplifies the potential for unauthorized access and compromises the integrity, availability, and confidentiality of information systems.


Contribute your Thoughts:

0/2000 characters
Layla
2 months ago
D is concerning, but I think B is the biggest risk overall.
upvoted 0 times
...
Fausto
2 months ago
C is a problem, proprietary protocols can be really risky.
upvoted 0 times
...
Daisy
3 months ago
Wow, I didn't realize how much bigger the attack surface is!
upvoted 0 times
...
Justine
3 months ago
I’m not so sure about that, A could be a huge issue too.
upvoted 0 times
...
Terrilyn
3 months ago
Definitely B, the attack surface is way bigger now.
upvoted 0 times
...
Gwenn
3 months ago
Cloud-based systems for IoT data collection definitely have risks, but I wonder if they are more significant than the attack surface problem.
upvoted 0 times
...
Oretha
4 months ago
I practiced a question similar to this, and I think the proprietary protocols might create risks, but they don't seem as critical as the attack surface.
upvoted 0 times
...
Elroy
4 months ago
I think the use of cheap microcontrollers could lead to vulnerabilities, but I feel like the attack surface is a bigger issue overall.
upvoted 0 times
...
Valentin
4 months ago
I remember discussing how the larger attack surface of IoT devices could be a major concern, but I'm not entirely sure if it's the greatest risk.
upvoted 0 times
...
Ryann
4 months ago
I feel pretty confident that the answer is B. IoT systems connect so many more devices and endpoints, that has to be the biggest risk factor.
upvoted 0 times
...
Sue
4 months ago
Okay, let me break this down. The key is understanding how IoT systems differ from traditional IT and what the biggest vulnerability would be. I'm leaning towards B.
upvoted 0 times
...
Hannah
4 months ago
Hmm, I'm not sure about this one. The options all seem plausible risks, I'll have to think it through carefully.
upvoted 0 times
...
Lindsey
5 months ago
This question seems straightforward, I think the answer is B - a much larger attack surface than traditional IT systems.
upvoted 0 times
...
Honey
7 months ago
I still think B) is the biggest risk, but C) is definitely something to consider as well.
upvoted 0 times
...
Celestine
7 months ago
D seems tempting, but cloud-based systems can be secured. I agree that B is the greatest risk - all those IoT devices are just asking to be hacked.
upvoted 0 times
...
France
7 months ago
Haha, 'cheap' microcontrollers in A? That's a good one. I'm going with B though, the attack surface is just too huge to ignore.
upvoted 0 times
...
Lore
7 months ago
Hmm, I'm not sure. The use of proprietary protocols in C could also be a major issue, making it harder to secure the system. But B does seem like the biggest overall risk.
upvoted 0 times
Viva
5 months ago
C) Use of proprietary networking protocols between nodes.
upvoted 0 times
...
Dyan
6 months ago
B) Much larger attack surface than traditional IT systems.
upvoted 0 times
...
Latosha
6 months ago
A) Use of 'cheap' microcontroller based sensors.
upvoted 0 times
...
Viva
7 months ago
C) Use of proprietary networking protocols between nodes.
upvoted 0 times
...
Tashia
7 months ago
B) Much larger attack surface than traditional IT systems.
upvoted 0 times
...
Jacklyn
7 months ago
A) Use of 'cheap' microcontroller based sensors.
upvoted 0 times
...
...
Raina
7 months ago
That's a good point, Marshall. Proprietary protocols could make it harder to secure the system.
upvoted 0 times
...
Marshall
7 months ago
I believe C) Use of proprietary networking protocols between nodes could also pose a risk.
upvoted 0 times
...
Dana
7 months ago
I think the answer is B. A larger attack surface due to the interconnected nature of IoT systems is a huge risk. All those endpoints are vulnerable entry points for hackers.
upvoted 0 times
Jackie
7 months ago
B) Much larger attack surface than traditional IT systems.
upvoted 0 times
...
Felicia
7 months ago
A) Use of 'cheap' microcontroller based sensors.
upvoted 0 times
...
...
Honey
7 months ago
I agree with Raina, having a larger attack surface is definitely a major concern.
upvoted 0 times
...
Raina
7 months ago
I think the greatest risk is B) Much larger attack surface than traditional IT systems.
upvoted 0 times
...

Save Cancel