Certification Practice Test | PDF Questions | Actual Questions | Test Engine | Pass4Sure
ITS-210 : Certified Internet of Things Security Practitioner (CIoTSP) Exam
CertNexus ITS-210 Questions & Answers
Full Version: 147 Q&A
ITS-210 Dumps
ITS-210 Braindumps
ITS-210 Real Questions
ITS-210 Practice Test
ITS-210 Actual Questions
CertNexus
ITS-210
Certified Internet of Things Security Practitioner
(CIoTSP)
https://killexams.com/pass4sure/exam-detail/ITS-210
Question: 20
A web application is connected to an IoT endpoint. A hacker wants to steal data from the connection between them.
Which of the following is NOT a method of attack that could be used to facilitate stealing data?
A. Cross-Site Request Forgery (CSRF)
B. SQL Injection (SQLi)
C. Cross-Site Scripting (XSS)
D. LDAP Injection
Answer: D
Question: 21
If a site administrator wants to improve the secure access to a cloud portal, which of the following would be the BEST
countermeasure to implement?
A. Require frequent password changes
B. Mandate multi-factor authentication (MFA)
C. Utilize role-based access control (RBAC)
D. Require separation of duties
Answer: C
Question: 22
An IoT developer discovers that clients frequently fall victim to phishing attacks.
What should the developer do in order to ensure that customer accounts cannot be accessed even if the customer's
password has been compromised?
A. Implement two-factor authentication (2FA)
B. Enable Kerberos authentication
C. Implement account lockout policies
D. Implement Secure Lightweight Directory Access Protocol (LDAPS)
Answer: A
Question: 23
An IoT security practitioner should be aware of which common misconception regarding data in motion?
A. That transmitted data is point-to-point and therefore a third party does not exist.
B. The assumption that all data is encrypted properly and cannot be exploited.
C. That data can change instantly so old data is of no value.
D. The assumption that network protocols automatically encrypt data on the fly.
Answer: B
Question: 24
In order to successfully perform a man-in-the-middle (MITM) attack against a secure website, which of the following
could be true?
A. Client to server traffic must use Hypertext Transmission Protocol (HTTP)
B. The server must be vulnerable to malformed Uniform Resource Locator (URL) injection
C. The server must be using a deprecated version of Transport Layer Security (TLS)
D. The web server's
E. 509 certificate must be compromised
Answer: C
Explanation:
Reference: https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/
Question: 25
Which of the following attacks is a reflected Distributed Denial of Service (DDoS) attack?
A. Teardrop
B. Ping of Death
C. SYN flood
D. Smurf
Answer: C
Explanation:
Reference: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
Question: 26
The network administrator for an organization has read several recent articles stating that replay attacks are on the rise.
Which of the following secure protocols could the administrator implement to prevent replay attacks via remote
workersâ VPNs? (Choose three.)
A. Internet Protocol Security (IPSec)
B. Enhanced Interior Gateway Routing Protocol (EIGRP)
C. Password Authentication Protocol (PAP)
D. Challenge Handshake Authentication Protocol (CHAP)
E. Simple Network Management Protocol (SNMP)
F. Layer 2 Tunneling Protocol (L2TP)
G. Interior Gateway Routing Protocol (IGRP)
Answer: A,D,F
Question: 27
Which of the following tools or techniques is used by software developers to maintain code, but also used by hackers
to maintain control of a compromised system?
A. Disassembler
B. Backdoor
C. Debugger
D. Stack pointer
Answer: B
Question: 28
Passwords should be storedâ
A. For no more than 30 days.
B. Only in cleartext.
C. As a hash value.
D. Inside a digital certificate.
Answer: C
Explanation:
Reference: https://snyk.io/learn/password-storage-best-practices/
Question: 29
If an attacker were able to gain access to a user's machine on your network, which of the following actions would she
most likely take next?
A. Start log scrubbing
B. Escalate privileges
C. Perform port scanning
D. Initiate reconnaissance
Answer: C
Question: 30
Which of the following is the BEST encryption standard to implement for securing bulk data?
A. Triple Data Encryption Standard (3DES)
B. Advanced Encryption Standard (AES)
C. Rivest Cipher 4 (RC4)
D. Elliptic curve cryptography (ECC)
Answer: B
Question: 31
A user grants an IoT manufacturer consent to store personally identifiable information (PII).
According to the General Data Protection Regulation (GDPR), when is an organization required to delete this data?
A. Within ninety days after collection, unless required for a legal proceeding
B. Within thirty days of a user's written request
C. Within seven days of being transferred to secure, long-term storage
D. Within sixty days after collection, unless encrypted
Answer: B
Question: 32
An OT security practitioner wants to implement two-factor authentication (2FA).
Which of the following is the least secure method to use for implementation?
A. Out-of-band authentication (OOBA)
B. 2FA over Short Message Service (SMS)
C. Authenticator Apps for smartphones
D. Fast Identity Online (FIDO) Universal 2nd Factor (U2F) USB key
Answer: B
Question: 33
An IoT system administrator discovers that unauthorized users are able to log onto and access data on remote IoT
monitoring devices.
What should the system administrator do on the remote devices in order to address this issue?
A. Encrypt all locally stored data
B. Ensure all firmware updates have been applied
C. Change default passwords
D. Implement URL filtering
Answer: C
Question: 34
An IoT security administrator realizes that when he attempts to visit the administrative website for his devices, he is
sent to a fake website.
To which of the following attacks has he likely fallen victim?
A. Buffer overflow
B. Denial of Service (DoS)
C. Birthday attack
D. Domain name system (DNS) poisoning
Answer: D
Question: 35
Which of the following technologies allows for encryption of networking communications without requiring any
configuration on IoT endpoints?
A. Transport Layer Security (TLS)
B. Internet Protocol Security (IPSec)
C. Virtual private network (VPN)
D. Elliptic curve cryptography (ECC)
Answer: C
User: Ava***** killexams.com practice tests have an interesting approach to make difficult topics easy by presenting them in a brief, simple, and concise way. Their materials helped me answer all the questions in half the time, and I passed the ITS-210 exam with ease. Thank you, killexams.com. |
User: Tatyana***** I am grateful for the excellent its-210 exam preparation option provided by Killexams.com. The exam practice tests were actual, and I contacted customer support before making a purchase to ensure that the material was up-to-date. They assured me that they update all exams almost every day, and it was true. The exam brain sell-off was worth buying because I could rely on the cutting-edge exam material. I am confident that I will use Killexams.com as my primary training resource to expand my certification portfolio into other providers. |
User: Martin***** To become its-210 certified, I was determined to pass the exam after failing the last two attempts. Thankfully, I received Killexams.com material from my cousin. I was very impressed with the Questions and Answers material as I scored 89%. I am satisfied that I scored above the passing mark without any difficulty. The material was well-formatted and enriched with essential standards, making it an excellent choice for the exam. |
User: Olya***** I owe my success in passing the its-210 exam to killexams.com. Two weeks after using their study material and practicing with their engine, I felt confident in answering any question that could come up. And it turned out to be true as I had already seen almost all the questions that came up in the exam. I cannot thank killexams.com enough for making this possible for me. |
User: Timofei***** I purchased a brain dump test for the ITS-210 exam from killexams.com and was worried about its usefulness after hearing about the update. However, their customer support staff informed me that the exam had been recently updated, and upon testing it against the latest objectives, I found that it was indeed updated. I am impressed with their efficiency and customer service, and I am now looking forward to taking my ITS-210 exam in two weeks. |
Features of iPass4sure ITS-210 Exam
- Files: PDF / Test Engine
- Premium Access
- Online Test Engine
- Instant download Access
- Comprehensive Q&A
- Success Rate
- Real Questions
- Updated Regularly
- Portable Files
- Unlimited Download
- 100% Secured
- Confidentiality: 100%
- Success Guarantee: 100%
- Any Hidden Cost: $0.00
- Auto Recharge: No
- Updates Intimation: by Email
- Technical Support: Free
- PDF Compatibility: Windows, Android, iOS, Linux
- Test Engine Compatibility: Mac / Windows / Android / iOS / Linux
Premium PDF with 147 Q&A
Get Full VersionAll CertNexus Exams
CertNexus ExamsCertification and Entry Test Exams
Complete exam list