Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam ITS-110 Topic 1 Question 21 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 21
Topic #: 1
[All ITS-110 Questions]

An IoT device which allows unprotected shell access via console ports is most vulnerable to which of the following risks?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Aleta
1 months ago
Unprotected shell access? That's like serving a five-course meal to hackers on a silver platter. I'm going with C, but only because I don't want to get arrested for revealing the _real_ vulnerabilities.
upvoted 0 times
Shaunna
11 hours ago
B: I agree, it's like inviting trouble right into your system.
upvoted 0 times
...
Clorinda
3 days ago
A: Definitely C, malware installation is a huge risk with unprotected shell access.
upvoted 0 times
...
Ettie
4 days ago
A: Definitely, we need to be careful with IoT devices and make sure they are secure.
upvoted 0 times
...
Laurel
8 days ago
B: I agree, giving hackers that kind of access is just asking for trouble. C seems like the most dangerous option.
upvoted 0 times
...
Louvenia
9 days ago
A: Yeah, unprotected shell access is a huge security risk. I think C is the right answer too.
upvoted 0 times
...
...
Shayne
1 months ago
Hmm, buffer overflow? That's so 90s. I'm feeling a bit more 'modern' today, so I'm gonna go with C. Malware installation FTW!
upvoted 0 times
Keva
9 days ago
I'm gonna stick with A. Directory harvesting seems like a sneaky way to get access.
upvoted 0 times
...
Filiberto
15 days ago
Yeah, I agree. It's definitely a more modern threat compared to buffer overflow.
upvoted 0 times
...
Albina
26 days ago
I think C is the way to go too. Malware installation sounds like a big risk.
upvoted 0 times
...
...
Gabriele
2 months ago
Hold up, you really think an IoT device with an unprotected shell is only vulnerable to directory harvesting? Come on, that's like the tip of the iceberg. Malware installation all the way, baby!
upvoted 0 times
France
9 days ago
I agree, directory harvesting is just the beginning. Malware installation is a serious threat.
upvoted 0 times
...
Alberta
1 months ago
Malware installation all the way! That's the real danger.
upvoted 0 times
...
...
Roxane
2 months ago
Directory harvesting? Nah, that's too old-school. I'm going with the rainbow table attacks. Gotta keep up with the latest hacker trends, you know?
upvoted 0 times
...
Shasta
2 months ago
I disagree, I think the answer is D) Buffer overflow because it can exploit vulnerabilities in the device's software.
upvoted 0 times
...
Selma
2 months ago
I agree with Lauran, because having unprotected shell access can easily lead to malware installation.
upvoted 0 times
...
Lauran
2 months ago
I think the answer is C) Malware installation.
upvoted 0 times
...

Save Cancel