Weekly CISSP Practice
Exam Questions
Week 36 - Question 1
Which of the following is NOT an Internet of Things (IoT) security concern?
A. Device Authenticity
B. Data Privacy
C. Quantum Computing
D. Network Security
Answer: C
Explanation:
A. Device Authenticity
Device authenticity ensures that the device connecting to your network is exactly what it claims to be and hasn't been replaced by a rogue "imposter" device.
-
The IoT Problem: Many IoT devices use hardcoded credentials or lack the ability to store unique digital certificates.
This makes it easier for an attacker to spoof a device to gain entry to the network. -
The Solution: Implementing 802.1X or using Manufacturer Usage Descriptions (MUD) to verify the identity and intended behavior of the device.
B. Data Privacy
IoT devices (smart cameras, medical sensors, thermostats) are designed to collect massive amounts of real-world data, much of it sensitive.
-
The Concern: If the data is not encrypted at rest on the device or in transit to the cloud, it violates the Confidentiality pillar of the CIA Triad.
-
Regulatory Risk: For healthcare IoT, this falls under HIPAA; for consumer IoT in Europe, it falls under GDPR.
C. Quantum Computing
Quantum computing involves using the principles of quantum mechanics to perform calculations that are impossible for classical computers.
-
Why it's the Answer: While quantum computing is a massive threat to all current cryptography (it could potentially break RSA and ECC), it is a future, systemic risk to the entire field of information security.
It is not an "IoT-specific" concern. -
The Context: IoT devices struggle with basic security (like default passwords and lack of patching) today.
Worrying about a quantum computer attacking a smart lightbulb is out of scope for standard IoT threat models.
D. Network Security
IoT devices are often "headless" (no screen/keyboard) and connect via various protocols like Wi-Fi, Bluetooth, Zigbee, or Z-Wave.
-
The Risk: Most IoT devices have limited "stack" protection, making them vulnerable to being hijacked and turned into botnets (like the famous Mirai botnet) to launch massive DDoS attacks.
-
The Strategy: The primary network control for IoT is Micro-segmentation—placing IoT devices on their own isolated VLAN so that if they are compromised, the attacker cannot "pivot" to the corporate servers or sensitive databases.
Podcasts
Check out my weekly podcasts that delve deep into the relevant topics related to each of CISSP domains. In addition, I will go over specific questions and they can be interpreted and answered.
CISSP Cyber Training Academy
Tired of not knowing how to study for the CISSP Exam?
Check out the CISSP Cyber Training Academy to help you on your journey!
CISSP Cyber Training - YouTube
Check out my video collection on YouTube discussing all the details needed to help you pass the CISSP exam.