Test Online Free CertNexus ITS-110 Exam Questions and Answers
Practice a live sample before buying full access. This page keeps the free ITS-110 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.
An IoT system administrator wants to mitigate the risk of rainbow table attacks.
Which of the following methods or technologies can the administrator implement in order to address this concern?
Answer:
Question 4Selectable Answer
An IoT gateway will be brokering data on numerous northbound and southbound interfaces. A security practitioner has the data encrypted while stored on the gateway and encrypted while transmitted across the network.
Should this person be concerned with privacy while the data is in use?
Answer:
Question 5Selectable Answer
A site administrator is not enforcing strong passwords or password complexity. To which of the following types of attacks is this system probably MOST vulnerable?
An IoT software developer wants the users of her software tools to know if they have been modified by someone other than her.
Which of the following tools or techniques should she use?
Answer:
Question 7Selectable Answer
An IoT developer discovers that clients frequently fall victim to phishing attacks.
What should the developer do in order to ensure that customer accounts cannot be accessed even if the customer's password has been compromised?
Answer:
Question 8Selectable Answer
An IoT security administrator wishes to mitigate the risk of falling victim to Distributed Denial of Service (DDoS) attacks.
Which of the following mitigation strategies should the security administrator implement? (Choose two.)
Answer:
Question 9Selectable Answer
Which of the following technologies allows for encryption of networking communications without requiring any configuration on IoT endpoints?
Answer:
Question 10Selectable Answer
An IoT developer has endpoints that are shipped to users in the field.
Which of the following best practices must be implemented for using default passwords after delivery?
Answer:
Question 11Selectable Answer
The network administrator for an organization has read several recent articles stating that replay attacks are on the rise.
Which of the following secure protocols could the administrator implement to prevent replay attacks via remote workers’ VPNs? (Choose three.)
Answer:
Question 12Selectable Answer
Which of the following describes the most significant risk created by implementing unverified certificates on an IoT portal?
Answer:
Question 13Selectable Answer
An IoT developer needs to ensure that user passwords for a smartphone app are stored securely.
Which of the following methods should the developer use to meet this requirement?
Answer:
Question 14Selectable Answer
Which of the following attacks is a reflected Distributed Denial of Service (DDoS) attack?