Podcast
Questions and Answers
Which of the following components should be included in an enterprise IoT cyber security policy?
Which of the following components should be included in an enterprise IoT cyber security policy?
- Software Updates
- Data Backup
- Encryption (correct)
- Firewall
What is the purpose of monitoring in an enterprise IoT cyber security policy?
What is the purpose of monitoring in an enterprise IoT cyber security policy?
- To enforce software updates
- To prevent physical security breaches
- To identify out-of-compliance implementations (correct)
- To ensure data backup
What is the role of authentication and access control in an enterprise IoT cyber security policy?
What is the role of authentication and access control in an enterprise IoT cyber security policy?
- To control user access to IoT devices (correct)
- To monitor network traffic
- To encrypt data
- To prevent physical security breaches