As a cybersecurity analyst at IoT Defend, you are working with a large utility company that uses Industrial Control Systems (ICS) in its operational technology (OT) environment. The company has recently integrated IoT devices into this environment to enable remote monitoring and control. They want to ensure these devices do not become a weak link in their security posture. To identify potential vulnerabilities in the IoT devices, which of the following actions should you recommend as the first step? A. Use stronger encryption algorithms for data transmission between IoT devices. B. Implement network segmentation to isolate IoT devices from the rest of the network. C. Conduct a vulnerability assessment specifically for the IoT devices. D. Install the latest antivirus software on each IoT device. Correct Answer: C This question is in 312-50v12 exam For getting CEH Certificate
Please login or Register to submit your answer