Free ITS-110 Exam Braindumps (page: 12)

Page 11 of 26

A cloud developer for an IoT service is storing billing information.
Which of the following should be considered a common vulnerability in regard to this data that could be used to compromise privacy?

  1. Enabled notifications as required by law
  2. Lack of data retention policies
  3. Authorized access to personal information
  4. Secured data in motion and at rest

Answer(s): C



An IoT service collects massive amounts of data and the developer is encrypting the data, forcing administrative users to authenticate and be authorized. The data is being disposed of properly and on a timely basis. However, which of the following countermeasures is the developer most likely overlooking?

  1. That private data can never be fully destroyed.
  2. The best practice to only collect critical data and nothing more.
  3. That data isn't valuable unless it's used as evidence for crime committed.
  4. That data is only valuable as perceived by the beholder.

Answer(s): B



Recently, you purchased a smart watch from Company

  1. You receive a notification on your watch that you missed a call and have a new message. Upon checking the message, you hear the following:
    "Hello, my name is Julie Simmons, and I'm with Company I want to thank you for your recent purchase and send you a small token of our appreciation. Please call me back at 888-555-1234. You will need to enter your credit card number, so we can authenticate you and ship your gift. Thanks for being a valued customer and enjoy your gift!"
    Which of the following types of attacks could this be?
  2. Phishing
  3. Spear phishing
  4. Whaling
  5. Vishing

Answer(s): B


Reference:

https://www.techtarget.com/searchsecurity/definition/spear-phishing



You work for a business-to-consumer (B2C) IoT device company. Your organization wishes to publish an annual report showing statistics related to the volume and variety of sensor data it collects.
Which of the following should your organization do prior to using this information?

  1. Confirm the devices they've sold are turned on
  2. Ensure all sensors are running the latest software
  3. Require customers to sign a subscription license
  4. Remove any customer-specific data

Answer(s): D






Post your Comments and Discuss CertNexus ITS-110 exam with other Community members:

ITS-110 Discussions & Posts