During a security audit, a team discovers older IoT gateways still run firmware that includes known flaws. Which approach addresses the flaw to reduce unauthorized access?
Implement limits on login rules so connections can be restricted based on role.
Mandate additional privilege reviews on the operating system for each new session.
Monitor and assess all traffic flows to detect inconsistencies in the environment.
Obtain updated code from the vendor and install through the device’s control interface.
Updating device firmware ensures that known vulnerabilities are patched at the source, eliminating exploitable flaws in the system’s logic. While traffic monitoring and access restrictions are important supplemental controls, they cannot fully address the inherent risks posed by outdated or insecure firmware versions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is firmware, and why is it important to update it?
Open an interactive chat with Bash
Why is updating firmware preferred over monitoring traffic in this scenario?
Open an interactive chat with Bash
How can IoT gateways typically be updated with new firmware?