Certified Ethical Hacker (CEH) Practice Question

During a security assessment, you discover that several smart lighting controllers expose an unauthenticated HTTP service on port 80, and the vendor has no firmware fix available. The devices must stay operational to keep building lights functional. Which measure will most effectively reduce the risk of remote exploitation while preserving necessary management access to the controllers?

  • Move the controllers into a dedicated VLAN and use firewall rules to allow HTTP access only from the authorized building-management workstation

  • Enable MAC address filtering on the facility's wireless access points to restrict which laptops can connect

  • Install signature-based antivirus software directly on each lighting controller

  • Block all inbound traffic to TCP port 80 on the organization's perimeter firewall

Certified Ethical Hacker (CEH)
Mobile Platform, IoT, and OT Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot