IoT SecurityusesMAC address,device manufacturer, andOS informationtoidentify and classify devicesvia Device-ID.
“IoT Security uses passive network traffic analysis to fingerprint devices based on the MAC address, manufacturer, and operating system to ensure accurate classification.â€
(Source: IoT Security Device-ID and Classification)
These attributes provide a robust, manufacturer-agnostic method to fingerprint IoT devices.
Question # 18
Which two prerequisites must be evaluated when decrypting internet-bound traffic? (Choose two.)
When implementing SSL Forward Proxy decryption for outbound traffic, two key challenges that must be evaluated are:
Incomplete certificate chains: This occurs when the firewall cannot validate the entire certificate chain for a site, which may cause decryption failures.
Certificate pinning: Applications like banking apps may use certificate pinning to prevent MITM (man-in-the-middle) attacks, and these applications will break if SSL Forward Proxy is used.
“When decrypting outbound SSL traffic, you must consider incomplete certificate chains, which can cause decryption to fail if the firewall cannot validate the entire chain. Also, be aware of certificate pinning in applications that prevents decryption by rejecting forged certificates.â€