Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam ITS-110 Topic 1 Question 37 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 37
Topic #: 1
[All ITS-110 Questions]

An IoT security practitioner should be aware of which common misconception regarding data in motion?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Theron
18 days ago
Encryption? Who needs that when you can just send your data through carrier pigeons. They're way more secure than any of those newfangled 'internet' things.
upvoted 0 times
...
Evan
21 days ago
Ah, the classic 'third party doesn't exist' assumption. It's like thinking your house is secure because you have a sign that says 'Beware of Dog' - you can't just ignore the fact that there are bad actors out there.
upvoted 0 times
...
Brunilda
29 days ago
Wait, data can change instantly? That's news to me. I thought data was like a rock, just sitting there forever. Boy, am I in for a surprise!
upvoted 0 times
Vivan
2 days ago
C) That data can change instantly so old data is of no value.
upvoted 0 times
...
Novella
2 days ago
B) The assumption that all data is encrypted properly and cannot be exploited.
upvoted 0 times
...
Lonna
13 days ago
A) That transmitted data is point-to-point and therefore a third party does not exist.
upvoted 0 times
...
...
Na
1 months ago
Well, I'm pretty sure the network protocols don't magically encrypt everything on their own. That's just wishful thinking. You need to actually configure and manage the encryption properly.
upvoted 0 times
Katie
2 days ago
User 4: We can't rely on magic, we need to be proactive in securing data.
upvoted 0 times
...
Mabel
9 days ago
User 3: It's a common misconception to assume data is always encrypted.
upvoted 0 times
...
Alberta
16 days ago
User 3: It's a common misconception to think data is always encrypted and secure.
upvoted 0 times
...
Chantell
22 days ago
User 2: That's right, we need to configure and manage encryption properly.
upvoted 0 times
...
Denna
23 days ago
User 2: That's right, we need to configure and manage encryption properly.
upvoted 0 times
...
Emeline
27 days ago
User 1: I agree, network protocols don't automatically encrypt data.
upvoted 0 times
...
Annalee
29 days ago
User 1: I agree, network protocols don't automatically encrypt data.
upvoted 0 times
...
...
Edelmira
2 months ago
I believe the correct answer is D, as some people may assume network protocols automatically encrypt data.
upvoted 0 times
...
Filiberto
2 months ago
The assumption that all data is encrypted properly and cannot be exploited? That's a dangerous misconception. I've seen way too many data breaches caused by sloppy encryption practices.
upvoted 0 times
Justine
27 days ago
B) The assumption that all data is encrypted properly and cannot be exploited.
upvoted 0 times
...
Vallie
28 days ago
A) That transmitted data is point-to-point and therefore a third party does not exist.
upvoted 0 times
...
...
Dominga
2 months ago
I agree with Pedro, because not all data is encrypted properly.
upvoted 0 times
...
Pedro
2 months ago
I think the answer is B.
upvoted 0 times
...

Save Cancel