Free ITS-110 Exam Braindumps

A manufacturer wants to ensure that user account information is isolated from physical attacks by storing credentials off-device.
Which of the following methods or technologies best satisfies this requirement?

  1. Role-Based Access Control (RBAC)
  2. Password Authentication Protocol (PAP)
  3. Remote Authentication Dial-In User Service (RADIUS)
  4. Border Gateway Protocol (BGP)

Answer(s): C



An IoT device which allows unprotected shell access via console ports is most vulnerable to which of the following risks?

  1. Directory harvesting
  2. Rainbow table attacks
  3. Malware installation
  4. Buffer overflow

Answer(s): C



An embedded developer is about to release an IoT gateway.
Which of the following precautions must be taken to minimize attacks due to physical access?

  1. Allow access only to the software
  2. Remove all unneeded physical ports
  3. Install a firewall on network ports
  4. Allow easy access to components

Answer(s): B



You work for an IoT software-as-a-service (SaaS) provider. Your boss has asked you to research a way to effectively dispose of stored sensitive customer dat

  1. Which of the following methods should you recommend to your boss?
  2. Crypto-shredding
  3. Degaussing
  4. Overwriting
  5. Physical destruction

Answer(s): D






Post your Comments and Discuss CertNexus ITS-110 exam with other Community members:

ITS-110 Discussions & Posts