Pass the CertNexus Certified IoT Security Practitioner ITS-110 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following technologies allows for encryption of networking communications without requiring any configuration on IoT endpoints?

Options:

A.

Transport Layer Security (TLS)


B.

Internet Protocol Security (IPSec)


C.

Virtual private network (VPN)


D.

Elliptic curve cryptography (ECC)


Expert Solution
Questions # 22:

An IoT security administrator realizes that when he attempts to visit the administrative website for his devices, he is sent to a fake website. To which of the following attacks has he likely fallen victim?

Options:

A.

Buffer overflow


B.

Denial of Service (DoS)


C.

Birthday attack


D.

Domain name system (DNS) poisoning


Expert Solution
Questions # 23:

A cloud developer for an IoT service is storing billing information. Which of the following should be considered a common vulnerability in regard to this data that could be used to compromise privacy?

Options:

A.

Enabled notifications as required by law


B.

Lack of data retention policies


C.

Authorized access to personal information


D.

Secured data in motion and at rest


Expert Solution
Questions # 24:

A compromised IoT device is initiating random connections to an attacker's server in order to exfiltrate sensitive data. Which type of attack is being used?

Options:

A.

Man-in-the-middle (MITM)


B.

SSL session hijack


C.

Reverse shell


D.

Honeypot


Expert Solution
Questions # 25:

An IoT developer wants to ensure all sensor to portal communications are as secure as possible and do not require any client-side configuration. Which of the following is the developer most likely to use?

Options:

A.

Virtual Private Networking (VPN)


B.

Public Key Infrastructure (PKI)


C.

IP Security (IPSec)


D.

Secure/Multipurpose Internet Mail Extensions (S/MIME)


Expert Solution
Questions # 26:

An IoT security administrator is determining which cryptographic algorithm she should use to sign her server's digital certificates. Which of the following algorithms should she choose?

Options:

A.

Rivest Cipher 6 (RC6)


B.

Rijndael


C.

Diffie-Hellman (DH)


D.

Rivest-Shamir-Adleman (RSA)


Expert Solution
Questions # 27:

An IoT developer wants to ensure that their cloud management portal is protected against compromised end-user credentials. Which of the following technologies should the developer implement?

Options:

A.

An authentication policy that requires a password at initial logon, and a second password in order to access advanced features.


B.

An authentication policy which requires user passwords to include twelve characters, including uppercase, lowercase, and special characters.


C.

An authentication policy that requires a user to provide a strong password and on-demand token delivered via SMS.


D.

An authentication policy which requires two random tokens generated by a hardware device.


Expert Solution
Questions # 28:

Which of the following is one way to implement countermeasures on an IoT gateway to ensure physical security?

Options:

A.

Add tamper detection to the enclosure


B.

Limit physical access to ports when possible


C.

Allow quick administrator access for mitigation


D.

Implement features in software instead of hardware


Expert Solution
Questions # 29:

It is a new employee's first day on the job. When trying to access secured systems, he incorrectly enters his credentials multiple times. Which resulting action should take place?

Options:

A.

His account is deleted.


B.

He receives a new password.


C.

His account is locked.


D.

He notifies Human Resources.


Expert Solution
Questions # 30:

An IoT security architect needs to secure data in motion. Which of the following is a common vulnerability used to exploit unsecure data in motion?

Options:

A.

External flash access


B.

Misconfigured Secure Sockets Layer (SSL)/Transport Layer Security (TLS)


C.

Databases and datastores


D.

Lack of memory space isolation


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions