Test Online Free CertNexus ITS-110 Exam Questions and Answers

The questions for ITS-110 were last updated On Dec.19 2022

Get ITS-110 Full Access
 / 2

Question No : 1
Which of the following encryption standards should an IoT developer select in order to implement an asymmetric key pair?

Answer:

Question No : 2
What is one popular network protocol that is usually enabled by default on home routers that creates a large attack surface?

Answer:
Explanation:
Reference: https://phoenixnap.com/blog/what-is-upnp

Question No : 3
An IoT system administrator wants to mitigate the risk of rainbow table attacks.
Which of the following methods or technologies can the administrator implement in order to address this concern?

Answer:

Question No : 4
An IoT gateway will be brokering data on numerous northbound and southbound interfaces. A security practitioner has the data encrypted while stored on the gateway and encrypted while transmitted across the network.
Should this person be concerned with privacy while the data is in use?

Answer:

Question No : 5
A site administrator is not enforcing strong passwords or password complexity. To which of the following types of attacks is this system probably MOST vulnerable?

Answer:
Explanation:
Reference: https://www.techtarget.com/searchsecurity/definition/dictionary-attack

Question No : 6
An IoT software developer wants the users of her software tools to know if they have been modified by someone other than her.
Which of the following tools or techniques should she use?

Answer:

Question No : 7
An IoT developer discovers that clients frequently fall victim to phishing attacks.
What should the developer do in order to ensure that customer accounts cannot be accessed even if the customer's password has been compromised?

Answer:

Question No : 8
An IoT security administrator wishes to mitigate the risk of falling victim to Distributed Denial of Service (DDoS) attacks.
Which of the following mitigation strategies should the security administrator implement? (Choose two.)

Answer:

Question No : 9
Which of the following technologies allows for encryption of networking communications without requiring any configuration on IoT endpoints?

Answer:

Question No : 10
An IoT developer has endpoints that are shipped to users in the field.
Which of the following best practices must be implemented for using default passwords after delivery?

Answer:

 / 2
  TOP 50 Exam Questions
Exam