CertNexus ITS-110 - Certified Internet of Things Security Practitioner (CIoTSP)
Which of the following techniques protects the confidentiality of the information stored in databases?
Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?
A manufacturer wants to ensure that user account information is isolated from physical attacks by storing credentials off-device. Which of the following methods or technologies best satisfies this requirement?
An IoT security administrator is concerned that someone could physically connect to his network and scan for vulnerable devices. Which of the following solutions should he install to prevent this kind of attack?
An IoT integrator wants to deploy an IoT gateway at the Edge and have it connect to the cloud via API. In order to minimize risk, which of the following actions should the integrator take before integration?
An IoT security administrator realizes that when he attempts to visit the administrative website for his devices, he is sent to a fake website. To which of the following attacks has he likely fallen victim?
What is one popular network protocol that is usually enabled by default on home routers that creates a large attack surface?
Which of the following items should be part of an IoT software company's data retention policy?
During a brute force test on his users’ passwords, the security administrator found several passwords that were cracked quickly. Which of the following passwords would have taken the longest to crack?
A developer is coding for an IoT product in the healthcare sector. What special care must the developer take?