Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam ITS-110 Topic 3 Question 52 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 52
Topic #: 3
[All ITS-110 Questions]

An embedded developer is about to release an IoT gateway. Which of the following precautions must be taken to minimize attacks due to physical access?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Walker
1 months ago
B) Remove all unneeded physical ports - No ports, no problems? More like no functionality, no IoT gateway. But hey, at least the hackers can't get in!
upvoted 0 times
Rene
12 days ago
B) Remove all unneeded physical ports - No ports, no problems? More like no functionality, no IoT gateway. But hey, at least the hackers can't get in!
upvoted 0 times
...
...
Blair
1 months ago
D) Allow easy access to components - Oh, that's a bold move! Inviting the hackers in for tea and crumpets. I like your style!
upvoted 0 times
...
Lorriane
1 months ago
A) Allow access only to the software - Why bother with the hardware? Just lock down the software and call it a day. What could go wrong?
upvoted 0 times
Brittni
10 days ago
C) Install a firewall on network ports - Adding an extra layer of security can help protect against unauthorized access.
upvoted 0 times
...
Clarinda
15 days ago
B) Remove all unneeded physical ports - It's important to limit the number of entry points for potential attackers.
upvoted 0 times
...
Evelynn
16 days ago
B) Remove all unneeded physical ports - Keeping only essential ports can help prevent unauthorized access to the device.
upvoted 0 times
...
Jarvis
18 days ago
C) Install a firewall on network ports - Adding a firewall can provide an extra layer of security to protect against attacks.
upvoted 0 times
...
Cecily
19 days ago
B) Remove all unneeded physical ports - It's important to limit physical access points to reduce potential vulnerabilities.
upvoted 0 times
...
...
Annamae
2 months ago
C) Install a firewall on network ports - Ah, the digital moat to keep the cyber-villains at bay. Brilliant!
upvoted 0 times
Bernardine
16 days ago
A) Allow access only to the software - Limiting access is key to preventing attacks.
upvoted 0 times
...
Abraham
19 days ago
C) Install a firewall on network ports - Definitely a must-have for added security.
upvoted 0 times
...
Cathrine
25 days ago
B) Remove all unneeded physical ports - Less entry points, less risk.
upvoted 0 times
...
...
Yesenia
2 months ago
B) Remove all unneeded physical ports - Gotta keep those hackers out! No ports, no problems!
upvoted 0 times
...
Ronna
2 months ago
I believe installing a firewall on network ports is also important to prevent attacks.
upvoted 0 times
...
Julene
3 months ago
I agree with Stephaine. Restricting physical access is crucial for security.
upvoted 0 times
...
Stephaine
3 months ago
I think we should remove all unneeded physical ports to minimize attacks.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77