Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CertNexus ITS-110 Practice Exam with Questions & Answers

Questions 1

An IoT service collects massive amounts of data and the developer is encrypting the data, forcing administrative users to authenticate and be authorized. The data is being disposed of properly and on a timely basis. However, which of the following countermeasures is the developer most likely overlooking?

Options:
A.

That private data can never be fully destroyed.

B.

The best practice to only collect critical data and nothing more.

C.

That data isn't valuable unless it's used as evidence for crime committed.

D.

That data is only valuable as perceived by the beholder.

CertNexus ITS-110 Premium Access
Questions 2

An IoT system administrator wants to mitigate the risk of rainbow table attacks. Which of the following methods or technologies can the administrator implement in order to address this concern?

Options:
A.

Enable account lockout

B.

Enable account database encryption

C.

Require frequent password changes

D.

Require complex passwords

Questions 3

An IoT software developer strives to reduce the complexity of his code to allow for efficient design and implementation. Which of the following terms describes the design principle he is implementing?

Options:
A.

Calibration

B.

Demodulation

C.

Encapsulation

D.

Abstraction

Questions 4

Which of the following methods or technologies is most likely to be used to protect an IoT portal against protocol fuzzing?

Options:
A.

Secure Hypertext Transfer Protocol (HTTPS)

B.

Public Key Infrastructure (PKI)

C.

Next-Generation Firewall (NGFW)

D.

Hash-based Message Authentication Code (HMAC)

Questions 5

In order to minimize the risk of abusing access controls, which of the following is a good example of granular access control implementation?

Options:
A.

System administrator access

B.

Least privilege principle

C.

Guest account access

D.

Discretionary access control (DAC)

Questions 6

A hacker is able to extract users' names, birth dates, height, and weight from an IoT manufacturer's user portal. Which of the following types of data has been compromised?

Options:
A.

Protected health information

B.

Personal health information

C.

Personal identity information

D.

Personally identifiable information

Questions 7

Web forms that contain unvalidated fields are vulnerable to which of the following attacks? (Choose two.)

Options:
A.

Smurf

B.

Ping of death

C.

Cross-Site Scripting (XSS)

D.

Man-in-the-middle (MITM)

E.

SQL Injection (SQLi)

Questions 8

An IoT system administrator discovers that hackers are using rainbow tables to compromise user accounts on their cloud management portal. What should the administrator do in order to mitigate this risk?

Options:
A.

Implement robust password policies

B.

Implement certificates on all login pages

C.

Implement granular role-based access

D.

Implement URL filtering

Questions 9

Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?

Options:
A.

Account lockout policy

B.

Automated security logging

C.

Role-based access control

D.

Secure password recovery

Questions 10

A hacker enters credentials into a web login page and observes the server's responses. Which of the following attacks is the hacker attempting?

Options:
A.

Account enumeration

B.

Directory traversal

C.

Buffer overflow

D.

Spear phishing