Mastering IoT Risk Management and Security Requirements Quiz
3 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a recommended practice for managing IoT security risks?

  • Establish baseline security requirements for IoT components. (correct)
  • Reassess security baseline requirements based on business needs.
  • Adopt a standardized industry recognized risk management approach.
  • Authorize deviations from standard baseline configurations.
  • What should be done prior to deploying, provisioning, or using IoT components with deviations from standard baseline configurations?

  • Establish baseline security requirements.
  • Comply with applicable legal, statutory, and regulatory compliance obligations.
  • Authorize the deviations following change management policies and procedures. (correct)
  • Reassess security baseline requirements based on business needs.
  • Why should compliance with security baseline requirements be reassessed?

  • To authorize deviations from standard baseline configurations.
  • To ensure business needs are being met. (correct)
  • To establish baseline security requirements.
  • To comply with applicable legal, statutory, and regulatory compliance obligations.
  • More Like This

    IoT Security and Hacking Quiz
    10 questions
    Lecture1 - IoT Security Challenges and Attacks
    15 questions
    Use Quizgecko on...
    Browser
    Browser