CISSP Practice Question (Security Architecture and Engineering - Hard):
Your organization is in the process of integrating embedded systems into its existing architecture to support various IoT initiatives. During the planning phase, the organization needs to ensure these systems can operate securely within its infrastructure. Which of the following is the most effective strategy to mitigate security risks associated with embedded systems within this context?
Options:
A. Implement full monitoring and security control implementation similar to traditional IT systems.
B. Allow peer-to-peer communication between embedded systems for greater flexibility.
C. Limit access and communications to devices and isolate them on dedicated networks.
D. Regularly update embedded devices' firmware using over-the-air updates to ensure current security patches are applied.
( answer tomorrow, study more now with CISSP.app! )
2
13 comments
Vincent Primiani
7
CISSP Practice Question (Security Architecture and Engineering - Hard):
CISSP Study Group
skool.com/cybersecurity-study-group
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
Powered by