Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 153 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 153
Topic #: 1
[All 312-50v12 Questions]

As a cybersecurity analyst at IoT Defend, you are working with a large utility company that uses Industrial Control Systems (ICS) in its operational technology (OT) environment. The company has recently integrated IoT devices into this environment to enable remote monitoring and control. They want to ensure these devices do not become a weak link in their security posture. To identify potential vulnerabilities in the IoT devices, which of the following actions should you recommend as the first step?

  • A. Use stronger encryption algorithms for data transmission between IoT devices.
  • B. Implement network segmentation to isolate IoT devices from the rest of the network.
  • C. Conduct a vulnerability assessment specifically for the IoT devices.
  • D. Install the latest antivirus software on each IoT device.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
yicx1
4 months, 4 weeks ago
Selected Answer: C
The key word is "to identify potential vulnerabilities". All other answers are about how to enhance security, only C is to identify potential vulnerabilities.
upvoted 1 times
...
LordXander
8 months ago
Selected Answer: C
A - only useful for MITM attack, otherwise..in case of an device takeover, this would not suffice B - well, if they need them to comunicate with the ICS in order to have remote access, you cannot really use segmentation...now can you? C - Seems very valid D - well, problem with antivirus software is that it doesn't cover all the zero-days that appear. Now if it would say patching and maintaining the device up-to-date, it would be a different scenario. So C, by elimination (also AI agrees)
upvoted 1 times
...
qtygbapjpesdayazko
8 months ago
Selected Answer: C
Keyword "To identify potential vulnerabilities"
upvoted 1 times
...
multivolt
9 months, 2 weeks ago
Im not certain about the reliability of that information
upvoted 1 times
...
insaniunt
9 months, 2 weeks ago
Selected Answer: C
C. Conduct a vulnerability assessment specifically for the IoT devices.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...