Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CertNexus ITS-110 - Certified Internet of Things Security Practitioner (CIoTSP)

Page: 1 / 3
Total 100 questions

Which of the following techniques protects the confidentiality of the information stored in databases?

A.

Hashing

B.

Archiving

C.

Monitoring

D.

Encryption

Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?

A.

Account lockout policy

B.

Automated security logging

C.

Role-based access control

D.

Secure password recovery

A manufacturer wants to ensure that user account information is isolated from physical attacks by storing credentials off-device. Which of the following methods or technologies best satisfies this requirement?

A.

Role-Based Access Control (RBAC)

B.

Password Authentication Protocol (PAP)

C.

Remote Authentication Dial-In User Service (RADIUS)

D.

Border Gateway Protocol (BGP)

An IoT security administrator is concerned that someone could physically connect to his network and scan for vulnerable devices. Which of the following solutions should he install to prevent this kind of attack?

A.

Media Access Control (MAC)

B.

Network Access Control (NAC)

C.

Host Intrusion Detection System (HIDS)

D.

Network Intrusion Detection System (NIDS)

An IoT integrator wants to deploy an IoT gateway at the Edge and have it connect to the cloud via API. In order to minimize risk, which of the following actions should the integrator take before integration?

A.

Write down the default login and password

B.

Remove all logins and passwords that may exist

C.

Create new credentials using a strong password

D.

Reset the IoT gateway to factory defaults

An IoT security administrator realizes that when he attempts to visit the administrative website for his devices, he is sent to a fake website. To which of the following attacks has he likely fallen victim?

A.

Buffer overflow

B.

Denial of Service (DoS)

C.

Birthday attack

D.

Domain name system (DNS) poisoning

What is one popular network protocol that is usually enabled by default on home routers that creates a large attack surface?

A.

Open virtual private network (VPN)

B.

Universal Plug and Play (UPnP)

C.

Network Address Translation (NAT)

D.

Domain Name System Security Extensions (DNSSEC)

Which of the following items should be part of an IoT software company's data retention policy?

A.

Transport encryption algorithms

B.

X.509 certificate expiration

C.

Data backup storage location

D.

Password expiration requirements

During a brute force test on his users’ passwords, the security administrator found several passwords that were cracked quickly. Which of the following passwords would have taken the longest to crack?

A.

GUESSmyPASSWORD

B.

Gu3$$MyP@s$w0Rd

C.

123my456password789

D.

**myPASSword**

A developer is coding for an IoT product in the healthcare sector. What special care must the developer take?

A.

Make sure the user interface looks polished so that people will pay higher prices.

B.

Apply best practices for privacy protection to minimize sensitive data exposure.

C.

Rapidly complete the product so that feedback from the market can be realized sooner.

D.

Slow down product development in order to obtain FDA approval with the first submission.