Free ITS-110 Exam Braindumps (page: 13)

Page 12 of 26

Which of the following items should be part of an IoT software company's data retention policy?

  1. Transport encryption algorithms
  2. X.509 certificate expiration
  3. Data backup storage location
  4. Password expiration requirements

Answer(s): C



A hacker is able to extract users' names, birth dates, height, and weight from an IoT manufacturer's user portal.
Which of the following types of data has been compromised?

  1. Protected health information
  2. Personal health information
  3. Personal identity information
  4. Personally identifiable information

Answer(s): D



Which of the following policies provides the BEST protection against identity theft when data stored on an IoT portal has been compromised?

  1. Data retention polices
  2. Data categorization policies
  3. Data anonymization policies
  4. Data disposal policies

Answer(s): C



An IoT system administrator discovers that hackers are using rainbow tables to compromise user accounts on their cloud management portal.
What should the administrator do in order to mitigate this risk?

  1. Implement robust password policies
  2. Implement certificates on all login pages
  3. Implement granular role-based access
  4. Implement URL filtering

Answer(s): C






Post your Comments and Discuss CertNexus ITS-110 exam with other Community members:

ITS-110 Discussions & Posts