312-50V12 · Question #171
312-50V12 Question #171: Real Exam Question with Answer & Explanation
The correct answer is C: Conduct a vulnerability assessment specifically for the IoT devices.. Before implementing any security controls for IoT devices in an OT/ICS environment, you must first understand what vulnerabilities exist. A vulnerability assessment provides the baseline knowledge needed to prioritize and apply appropriate remediation measures.
Question
As a cybersecurity analyst at IoT Defend, you are working with a large utility company that uses Industrial Control Systems (ICS) in its operational technology (OT) environment. The company has recently integrated IoT devices into this environment to enable remote monitoring and control. They want to ensure these devices do not become a weak link in their security posture. To identify potential vulnerabilities in the IoT devices, which of the following actions should you recommend as the first step?
Options
- AUse stronger encryption algorithms for data transmission between IoT devices.
- BImplement network segmentation to isolate IoT devices from the rest of the network.
- CConduct a vulnerability assessment specifically for the IoT devices.
- DInstall the latest antivirus software on each IoT device.
Explanation
Before implementing any security controls for IoT devices in an OT/ICS environment, you must first understand what vulnerabilities exist. A vulnerability assessment provides the baseline knowledge needed to prioritize and apply appropriate remediation measures.
Common mistakes.
- A. Implementing stronger encryption is a remediation control that addresses data-in-transit security, but it cannot be properly targeted or validated without first knowing which devices are vulnerable and what threats exist.
- B. Network segmentation is an important defense-in-depth control, but it is a mitigation strategy rather than a discovery step, and applying it without a prior assessment may still leave unknown vulnerabilities unaddressed within the segmented zone.
- D. Traditional antivirus software is largely incompatible with most IoT and ICS devices due to constrained hardware resources and proprietary operating systems, making this recommendation technically inappropriate for the described environment.
Concept tested. IoT vulnerability assessment as foundational security step
Reference. https://www.cisa.gov/sites/default/files/publications/IoT-Security-for-ICS_S508C.pdf
Topics
Community Discussion
No community discussion yet for this question.