Which of the following attacks is a reflected Distributed Denial of Service (DDoS) attack?
Answer(s): C
https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
An IoT security architect wants to implement Bluetooth between two nodes. The Elliptic Curve Diffie- Hellman (ECDH) cipher suite has been identified as a requirement. Which of the following Bluetooth versions can meet this requirement?
Answer(s): D
https://www.symmetryelectronics.com/blog/ble-4-1-vs-ble-4-2-new-features-and- advantages/
An IoT security administrator realizes that when he attempts to visit the administrative website for his devices, he is sent to a fake website. To which of the following attacks has he likely fallen victim?
Network filters based on Ethernet burned-in-addresses are vulnerable to which of the following attacks?
Answer(s): A
Post your Comments and Discuss CertNexus ITS-110 exam with other Community members: