ExamGecko
Question list
Search
Search

Question 20 - NSE7_ZTA-7.2 discussion

Report
Export

With the increase in loT devices, which two challenges do enterprises face? (Choose two.)

A.
Bandwidth consumption due to added overhead of loT
Answers
A.
Bandwidth consumption due to added overhead of loT
B.
Maintaining a high performance network
Answers
B.
Maintaining a high performance network
C.
Unpatched vulnerabilities in loT devices
Answers
C.
Unpatched vulnerabilities in loT devices
D.
Achieving full network visibility
Answers
D.
Achieving full network visibility
Suggested answer: C, D

Explanation:

With the increase in IoT devices, enterprises face many challenges in securing and managing their network and data. Two of the most significant challenges are:

Unpatched vulnerabilities in IoT devices (Option C): IoT devices are often vulnerable to cyber attacks due to their increased exposure to the internet and their limited computing resources.Some of the security challenges in IoT include weak password protection, lack of regular patches and updates, insecure interfaces, insufficient data protection, and poor IoT device management12. Unpatched vulnerabilities in IoT devices can allow hackers to exploit them and compromise the network or data.For example, the Mirai malware infected IoT devices by using default credentials and created a massive botnet that launched DDoS attacks on internet services2.

Achieving full network visibility (Option D): IoT devices can generate a large amount of data that needs to be collected, processed, and analyzed. However, many enterprises lack the tools and capabilities to monitor and manage the IoT devices and data effectively. This can result in poor performance, inefficiency, and security risks. Achieving full network visibility means having a clear and comprehensive view of all the IoT devices, their status, their connectivity, their data flow, and their potential threats.This can help enterprises optimize their network performance, ensure data quality and integrity, and detect and prevent any anomalies or attacks3.

asked 18/09/2024
Alvaro Campos
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first