Pass the CertNexus Certified IoT Security Practitioner ITS-110 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

In order to minimize the risk of abusing access controls, which of the following is a good example of granular access control implementation?

Options:

A.

System administrator access


B.

Least privilege principle


C.

Guest account access


D.

Discretionary access control (DAC)


Expert Solution
Questions # 12:

An IoT security architect wants to implement Bluetooth between two nodes. The Elliptic Curve Diffie-Hellman (ECDH) cipher suite has been identified as a requirement. Which of the following Bluetooth versions can meet this requirement?

Options:

A.

Bluetooth Low Energy (BLE) v4.0


B.

BLE v4.2


C.

BLE v4.1


D.

Any of the BLE versions


Expert Solution
Questions # 13:

An IoT system administrator discovers that unauthorized users are able to log onto and access data on remote IoT monitoring devices. What should the system administrator do on the remote devices in order to address this issue?

Options:

A.

Encrypt all locally stored data


B.

Ensure all firmware updates have been applied


C.

Change default passwords


D.

Implement URL filtering


Expert Solution
Questions # 14:

An IoT systems integrator has a very old IoT gateway that doesn't offer many security features besides viewing a system configuration page via browser over HTTPS. The systems integrator can't get their modern browser to bring up the page due to a cipher suite mismatch. Which of the following must the integrator perform before the configuration page can be viewed?

Options:

A.

Upgrade the browser, as modern browsers have stopped allowing connections to hosts that use only outdated cipher suites.


B.

Downgrade the browser, as modern browsers have stopped allowing connections to hosts that use only outdated cipher suites.


C.

Upgrade the browser, as older browsers have stopped allowing connections to hosts that use only outdated cipher suites.


D.

Downgrade the browser, as modern browsers have continued allowing connections to hosts that use only outdated cipher suites.


Expert Solution
Questions # 15:

A hacker is sniffing network traffic with plans to intercept user credentials and then use them to log into remote websites. Which of the following attacks could the hacker be attempting? (Choose two.)

Options:

A.

Masquerading


B.

Brute force


C.

Directory traversal


D.

Session replay


E.

Spear phishing


Expert Solution
Questions # 16:

In order to successfully perform a man-in-the-middle (MITM) attack against a secure website, which of the following could be true?

Options:

A.

Client to server traffic must use Hypertext Transmission Protocol (HTTP)


B.

The server must be vulnerable to malformed Uniform Resource Locator (URL) injection


C.

The server must be using a deprecated version of Transport Layer Security (TLS)


D.

The web server's X.509 certificate must be compromised


Expert Solution
Questions # 17:

An IoT gateway will be brokering data on numerous northbound and southbound interfaces. A security practitioner has the data encrypted while stored on the gateway and encrypted while transmitted across the network. Should this person be concerned with privacy while the data is in use?

Options:

A.

Yes, because the hash wouldn't protect the integrity of the data.


B.

Yes, because the data is vulnerable during processing.


C.

No, since the data is already encrypted while at rest and while in motion.


D.

No, because the data is inside the CPU's secure region while being used.


Expert Solution
Questions # 18:

An IoT developer wants to ensure that data collected from a remotely deployed power station monitoring system is transferred securely to the cloud. Which of the following technologies should the developer consider?

Options:

A.

Secure/Multipurpose Internet Mail Extensions (S/MIME)


B.

Message-digest 5 (MD5)


C.

Blowfish


D.

Transport Layer Security (TLS)


Expert Solution
Questions # 19:

A web administrator is concerned about injection attacks. Which of the following mitigation techniques should the web administrator implement?

Options:

A.

Configure single sign-on (SSO)


B.

Parameter validation


C.

Require strong passwords


D.

Require two-factor authentication (2FA)


Expert Solution
Questions # 20:

A corporation's IoT security administrator has configured his IoT endpoints to send their data directly to a database using Secure Sockets Layer (SSL)/Transport Layer Security (TLS). Which entity provides the symmetric key used to secure the data in transit?

Options:

A.

The administrator's machine


B.

The database server


C.

The Key Distribution Center (KDC)


D.

The IoT endpoint


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions