ISC2 Systems Security Certified Practitioner (SSCP) Practice Question
Your company operates a high-security R&D laboratory where Bluetooth-enabled IoT sensors monitor production processes. The CISO worries that employee-owned smartphones and wearables could introduce malware or surreptitiously capture data over short-range radios. You are revising facility entry procedures together with the physical security team to address this threat. Which control will most effectively mitigate the risk while following recommended practices for restricting personal mobile and IoT devices in sensitive areas?
Require all personal smartphones, tablets, and wearables to be powered off and stored in supervised, RF-shielded lockers at the laboratory entrance.
Install host-based firewalls on each IoT sensor to block inbound traffic from unrecognized MAC addresses.
Enforce enterprise mobile-device management that requires full-device encryption and allows remote wipe before permitting personal devices inside the lab.
Disable Bluetooth on all corporate Wi-Fi access points and mandate WPA3-Enterprise for wireless authentication within the lab.
In spaces that process highly sensitive information, best practice is to prevent any personal mobile or IoT device from entering rather than trying to secure each potential threat. NIST guidance on mobile device security and physical protection of information systems recommends prohibiting or isolating personally owned wireless devices in controlled areas or requiring them to be stored in tamper-resistant, radio-frequency-shielded containers outside the secure zone. Mandating placement of phones and wearables in monitored, RF-shielded lockers at the entrance directly eliminates their ability to connect to or eavesdrop on Bluetooth-enabled sensors and aligns IT security with physical access controls.
Mobile device management, improved Wi-Fi security, or host-based firewalls on the IoT sensors help reduce some risks but do not stop radio-frequency attacks or the introduction of rogue wireless bridges once the personal devices are inside. Only physically barring or shielding the devices keeps them from threatening the lab's confidentiality and integrity, making this the most effective option.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is RF shielding, and how does it work in security?
Open an interactive chat with Bash
Why is Bluetooth considered a security risk in sensitive areas?
Open an interactive chat with Bash
What does NIST recommend for mobile device security in sensitive areas?
Open an interactive chat with Bash
ISC2 Systems Security Certified Practitioner (SSCP)
Security Concepts and Practices
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99 $11.99
$11.99/mo
Billed monthly, Cancel any time.
$19.99 after promotion ends
3 Month Pass
$44.99 $26.99
$8.99/mo
One time purchase of $26.99, Does not auto-renew.
$44.99 after promotion ends
Save $18!
MOST POPULAR
Annual Pass
$119.99 $71.99
$5.99/mo
One time purchase of $71.99, Does not auto-renew.
$119.99 after promotion ends
Save $48!
BEST DEAL
Lifetime Pass
$189.99 $113.99
One time purchase, Good for life.
Save $76!
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .