Free Demo Questions

Test Online Free CertNexus ITS-110 Exam Questions and Answers

Practice a live sample before buying full access. This page keeps the free ITS-110 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.

Updated Dec 19, 2022 20 Questions 2 Pages
Page 1 of 2
Next Page
Question 1 Selectable Answer
Which of the following encryption standards should an IoT developer select in order to implement an asymmetric key pair?

Answer:
Question 2 Selectable Answer
What is one popular network protocol that is usually enabled by default on home routers that creates a large attack surface?

Answer:
Explanation:
Reference: https://phoenixnap.com/blog/what-is-upnp
Question 3 Selectable Answer
An IoT system administrator wants to mitigate the risk of rainbow table attacks.
Which of the following methods or technologies can the administrator implement in order to address this concern?

Answer:
Question 4 Selectable Answer
An IoT gateway will be brokering data on numerous northbound and southbound interfaces. A security practitioner has the data encrypted while stored on the gateway and encrypted while transmitted across the network.
Should this person be concerned with privacy while the data is in use?

Answer:
Question 5 Selectable Answer
A site administrator is not enforcing strong passwords or password complexity. To which of the following types of attacks is this system probably MOST vulnerable?

Answer:
Explanation:
Reference: https://www.techtarget.com/searchsecurity/definition/dictionary-attack
Question 6 Selectable Answer
An IoT software developer wants the users of her software tools to know if they have been modified by someone other than her.
Which of the following tools or techniques should she use?

Answer:
Question 7 Selectable Answer
An IoT developer discovers that clients frequently fall victim to phishing attacks.
What should the developer do in order to ensure that customer accounts cannot be accessed even if the customer's password has been compromised?

Answer:
Question 8 Selectable Answer
An IoT security administrator wishes to mitigate the risk of falling victim to Distributed Denial of Service (DDoS) attacks.
Which of the following mitigation strategies should the security administrator implement? (Choose two.)

Answer:
Question 9 Selectable Answer
Which of the following technologies allows for encryption of networking communications without requiring any configuration on IoT endpoints?

Answer:
Question 10 Selectable Answer
An IoT developer has endpoints that are shipped to users in the field.
Which of the following best practices must be implemented for using default passwords after delivery?

Answer:
Question 11 Selectable Answer
The network administrator for an organization has read several recent articles stating that replay attacks are on the rise.
Which of the following secure protocols could the administrator implement to prevent replay attacks via remote workers’ VPNs? (Choose three.)

Answer:
Question 12 Selectable Answer
Which of the following describes the most significant risk created by implementing unverified certificates on an IoT portal?

Answer:
Question 13 Selectable Answer
An IoT developer needs to ensure that user passwords for a smartphone app are stored securely.
Which of the following methods should the developer use to meet this requirement?

Answer:
Question 14 Selectable Answer
Which of the following attacks is a reflected Distributed Denial of Service (DDoS) attack?

Answer:
Explanation:
Reference: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
Question 15 Selectable Answer
Which of the following is one way to implement countermeasures on an IoT gateway to ensure physical security?

Answer:
Showing page 1 of 2
Next Page