Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 171 Topic 18 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 171 Topic 18 Discussion

312-50v13 Exam Topic 18 Question 171 Discussion:
Question #: 171
Topic #: 18

As a Certified Ethical Hacker evaluating a smart city project (traffic lights, public Wi-Fi, and water management), you find anomalous IoT network logs showing high-volume data exchange between a specific traffic light and an external IP address. Further investigation reveals an unexpectedly open port on that traffic light. What should be your subsequent course of action?


A.

Isolate the affected traffic light from the network and perform a detailed firmware investigation


B.

Conduct an exhaustive penetration test across the entire network to uncover hidden vulnerabilities


C.

Analyze and modify IoT firewall rules to block further interaction with the suspicious external IP


D.

Attempt to orchestrate a reverse connection from the traffic light to the external IP to understand the transferred data


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.