Free ITS-110 Exam Braindumps (page: 3)

Page 2 of 26

Which of the following attacks is a reflected Distributed Denial of Service (DDoS) attack?

  1. Teardrop
  2. Ping of Death
  3. SYN flood
  4. Smurf

Answer(s): C


Reference:

https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/



An IoT security architect wants to implement Bluetooth between two nodes. The Elliptic Curve Diffie- Hellman (ECDH) cipher suite has been identified as a requirement.
Which of the following Bluetooth versions can meet this requirement?

  1. Bluetooth Low Energy (BLE) v4.0
  2. BLE v4.2
  3. BLE v4.1
  4. Any of the BLE versions

Answer(s): D


Reference:

https://www.symmetryelectronics.com/blog/ble-4-1-vs-ble-4-2-new-features-and- advantages/



An IoT security administrator realizes that when he attempts to visit the administrative website for his devices, he is sent to a fake website. To which of the following attacks has he likely fallen victim?

  1. Buffer overflow
  2. Denial of Service (DoS)
  3. Birthday attack
  4. Domain name system (DNS) poisoning

Answer(s): D



Network filters based on Ethernet burned-in-addresses are vulnerable to which of the following attacks?

  1. Media Access Control (MAC) spoofing
  2. Buffer overflow
  3. Packet injection
  4. GPS spoofing

Answer(s): A






Post your Comments and Discuss CertNexus ITS-110 exam with other Community members:

ITS-110 Discussions & Posts