Bird
0
0

If a connected EV's software receives a message from an unknown source, what should the cybersecurity system do?

medium📝 Conceptual Q4 of 15
EV Technology - Connected Vehicle (V2X)
If a connected EV's software receives a message from an unknown source, what should the cybersecurity system do?
AIgnore the message and log the event
BAutomatically execute the message commands
CSend the message to all connected devices
DDelete all vehicle data immediately
Step-by-Step Solution
Solution:
  1. Step 1: Understand secure message handling

    Cybersecurity systems should not trust unknown sources and must log suspicious activity.
  2. Step 2: Choose safe response

    Ignoring the message prevents harm, and logging helps track potential threats.
  3. Final Answer:

    Ignore the message and log the event -> Option A
  4. Quick Check:

    Unknown message = Ignore and log [OK]
Quick Trick: Never trust unknown sources; log suspicious activity [OK]
Common Mistakes:
  • Executing unknown commands blindly
  • Broadcasting suspicious messages to others

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More EV Technology Quizzes