ExamGecko
Question list
Search
Search

Related questions











Question 522 - 312-50v12 discussion

Report
Export

You are a cybersecurlty consultant for a smart city project. The project involves deploying a vast network of loT devices for public utilities like traffic control, water supply, and power grid management The city administration is concerned about the possibility of a Distributed Denial of Service (DDoS) attack crippling these critical services. They have asked you for advice on how to prevent such an attack. What would be your primary recommendation?

A.
Implement regular firmware updates for all loT devices.
Answers
A.
Implement regular firmware updates for all loT devices.
B.
A Deploy network intrusion detection systems (IDS) across the loT network.
Answers
B.
A Deploy network intrusion detection systems (IDS) across the loT network.
C.
Establish strong, unique passwords for each loT device.
Answers
C.
Establish strong, unique passwords for each loT device.
D.
Implement IP address whitelisting for all loT devices.
Answers
D.
Implement IP address whitelisting for all loT devices.
Suggested answer: A

Explanation:

Implementing regular firmware updates for all IoT devices is the primary recommendation to prevent DDoS attacks on the smart city project.Firmware updates can fix security vulnerabilities, patch bugs, and improve performance of the IoT devices, making them less susceptible to malware infections and botnet recruitment12.Firmware updates can also enable new security features, such as encryption, authentication, and firewall, that can protect the IoT devices from unauthorized access and data theft3.Firmware updates should be done automatically or remotely, without requiring user intervention, to ensure timely and consistent security across the IoT network4.

The other options are not as effective or feasible as firmware updates for the following reasons:

B) Deploying network intrusion detection systems (IDS) across the IoT network can help detect and alert DDoS attacks, but not prevent them.IDS can monitor network traffic and identify malicious patterns, such as high volume, spoofed IP addresses, or unusual protocols, that indicate a DDoS attack5. However, IDS cannot block or mitigate the attack, and may even be overwhelmed by the flood of traffic, resulting in false positives or missed alerts. Moreover, deploying IDS across a vast network of IoT devices can be costly, complex, and resource-intensive, as it requires dedicated hardware, software, and personnel.

C) Establishing strong, unique passwords for each IoT device can prevent unauthorized access and brute-force attacks, but not DDoS attacks. Passwords can protect the IoT devices from being compromised by hackers who try to guess or crack the default or weak credentials. However, passwords cannot prevent DDoS attacks that exploit known or unknown vulnerabilities in the IoT devices, such as buffer overflows, command injections, or protocol flaws. Moreover, establishing and managing strong, unique passwords for each IoT device can be challenging and impractical, as it requires user awareness, memory, and effort.

D) Implementing IP address whitelisting for all IoT devices can restrict network access and communication to trusted sources, but not DDoS attacks. IP address whitelisting can filter out unwanted or malicious traffic by allowing only the predefined IP addresses to connect to the IoT devices. However, IP address whitelisting cannot prevent DDoS attacks that use spoofed or legitimate IP addresses, such as reflection or amplification attacks, that bypass the whitelisting rules. Moreover, implementing IP address whitelisting for all IoT devices can be difficult and risky, as it requires constant updating, testing, and monitoring of the whitelist, and may block legitimate or emergency traffic by mistake.

1: How to proactively protect IoT devices from DDoS attacks - Synopsys

2: IoT and DDoS: Cyberattacks on the Rise | A10 Networks

3: Detection and Prevention of DDoS Attacks on the IoT - MDPI

4: How to Secure IoT Devices: 5 Best Practices | IoT For All

5: Intrusion Detection Systems (IDS) Part 1 - Network Security | Coursera

: DDoS Attacks: Detection and Mitigation - Cisco

: The Challenges of IoT Security - Infosec Resources

: IoT Security: How to Protect Connected Devices and the IoT Ecosystem | Kaspersky

: IoT Security: Common Vulnerabilities and Attacks | IoT For All

: The Password Problem: How to Use Passwords Effectively in 2021 | Dashlane Blog

: What is IP Whitelisting? | Cloudflare

: DDoS Attacks: Types, Techniques, and Protection | Cloudflare

: IP Whitelisting: Pros and Cons | Imperva

asked 18/09/2024
Nikita Kazanenko
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first