Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam ITS-110 Topic 1 Question 21 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 21
Topic #: 1
[All ITS-110 Questions]

An IoT device which allows unprotected shell access via console ports is most vulnerable to which of the following risks?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Aleta
2 months ago
Unprotected shell access? That's like serving a five-course meal to hackers on a silver platter. I'm going with C, but only because I don't want to get arrested for revealing the _real_ vulnerabilities.
upvoted 0 times
Olene
12 days ago
A: We should always prioritize security when it comes to IoT devices.
upvoted 0 times
...
Shaunna
16 days ago
B: I agree, it's like inviting trouble right into your system.
upvoted 0 times
...
Clorinda
18 days ago
A: Definitely C, malware installation is a huge risk with unprotected shell access.
upvoted 0 times
...
Ettie
19 days ago
A: Definitely, we need to be careful with IoT devices and make sure they are secure.
upvoted 0 times
...
Laurel
23 days ago
B: I agree, giving hackers that kind of access is just asking for trouble. C seems like the most dangerous option.
upvoted 0 times
...
Louvenia
24 days ago
A: Yeah, unprotected shell access is a huge security risk. I think C is the right answer too.
upvoted 0 times
...
...
Shayne
2 months ago
Hmm, buffer overflow? That's so 90s. I'm feeling a bit more 'modern' today, so I'm gonna go with C. Malware installation FTW!
upvoted 0 times
Nada
15 days ago
Interesting choice. It's always good to consider different risks when it comes to IoT devices.
upvoted 0 times
...
Keva
24 days ago
I'm gonna stick with A. Directory harvesting seems like a sneaky way to get access.
upvoted 0 times
...
Filiberto
1 months ago
Yeah, I agree. It's definitely a more modern threat compared to buffer overflow.
upvoted 0 times
...
Albina
1 months ago
I think C is the way to go too. Malware installation sounds like a big risk.
upvoted 0 times
...
...
Gabriele
2 months ago
Hold up, you really think an IoT device with an unprotected shell is only vulnerable to directory harvesting? Come on, that's like the tip of the iceberg. Malware installation all the way, baby!
upvoted 0 times
France
25 days ago
I agree, directory harvesting is just the beginning. Malware installation is a serious threat.
upvoted 0 times
...
Alberta
2 months ago
Malware installation all the way! That's the real danger.
upvoted 0 times
...
...
Roxane
2 months ago
Directory harvesting? Nah, that's too old-school. I'm going with the rainbow table attacks. Gotta keep up with the latest hacker trends, you know?
upvoted 0 times
...
Shasta
2 months ago
I disagree, I think the answer is D) Buffer overflow because it can exploit vulnerabilities in the device's software.
upvoted 0 times
...
Selma
2 months ago
I agree with Lauran, because having unprotected shell access can easily lead to malware installation.
upvoted 0 times
...
Lauran
3 months ago
I think the answer is C) Malware installation.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77