Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam ITS-110 Topic 1 Question 36 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 36
Topic #: 1
[All ITS-110 Questions]

An IoT manufacturer needs to ensure that firmware flaws can be addressed even after their devices have been deployed. Which of the following methods should the manufacturer use to meet this requirement?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Devorah
2 months ago
I'd have to go with Option C as well. Having that over-the-air update capability is essential for an IoT product's long-term security.
upvoted 0 times
Felix
6 days ago
I think option C is the best choice for ensuring firmware flaws can be addressed.
upvoted 0 times
...
Trevor
12 days ago
It's definitely important to be able to update the firmware remotely.
upvoted 0 times
...
Felix
1 months ago
I agree, having OTA firmware updates is crucial for long-term security.
upvoted 0 times
...
...
Erasmo
2 months ago
What, no option for just throwing the device in the microwave to update the firmware? Come on, that's a classic!
upvoted 0 times
Gearldine
1 months ago
C) Ensure that device can accept Over-the-Air (OTA) firmware updates
upvoted 0 times
...
Erick
1 months ago
A) Ensure that the bootloader can be accessed remotely using Secure Shell (SSH)
upvoted 0 times
...
...
Venita
2 months ago
I agree, Option C is the way to go. OTA updates are the most practical solution for an IoT manufacturer to keep their devices secure.
upvoted 0 times
...
Francesco
2 months ago
Option C seems like the best choice to me. Being able to remotely update the firmware is crucial for addressing security issues after deployment.
upvoted 0 times
Georgene
1 months ago
D) Ensure that all firmware is signed using digital certificates prior to deployment
upvoted 0 times
...
Markus
2 months ago
A) Ensure that the bootloader can be accessed remotely using Secure Shell (SSH)
upvoted 0 times
...
Lawanda
2 months ago
C) Ensure that device can accept Over-the-Air (OTA) firmware updates
upvoted 0 times
...
...
Daniel
2 months ago
I think ensuring that all firmware is signed using digital certificates prior to deployment is also important for security.
upvoted 0 times
...
Alberto
2 months ago
I agree with Felicia. OTA updates would allow for easy and secure firmware updates even after the devices are deployed.
upvoted 0 times
...
Felicia
3 months ago
I think the manufacturer should use Over-the-Air (OTA) firmware updates to address firmware flaws after deployment.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77