CertNexus ITS-110 Exam
Certified Internet of Things Security Practitioner (Page 3 )

Updated On: 7-Feb-2026

An IoT security architect wants to implement Bluetooth between two nodes. The Elliptic Curve Diffie- Hellman (ECDH) cipher suite has been identified as a requirement.
Which of the following Bluetooth versions can meet this requirement?

  1. Bluetooth Low Energy (BLE) v4.0
  2. BLE v4.2
  3. BLE v4.1
  4. Any of the BLE versions

Answer(s): D


Reference:

https://www.symmetryelectronics.com/blog/ble-4-1-vs-ble-4-2-new-features-and- advantages/



An IoT security administrator realizes that when he attempts to visit the administrative website for his devices, he is sent to a fake website. To which of the following attacks has he likely fallen victim?

  1. Buffer overflow
  2. Denial of Service (DoS)
  3. Birthday attack
  4. Domain name system (DNS) poisoning

Answer(s): D



Network filters based on Ethernet burned-in-addresses are vulnerable to which of the following attacks?

  1. Media Access Control (MAC) spoofing
  2. Buffer overflow
  3. Packet injection
  4. GPS spoofing

Answer(s): A



An IoT security architect needs to minimize the security risk of a radio frequency (RF) mesh application.
Which of the following might the architect consider as part of the design?

  1. Make pairing between nodes very easy so that troubleshooting is reduced.
  2. Encrypt data transmission between nodes at the physical/logical layers.
  3. Prevent nodes from being rejected to keep the value of the network as high as possible.
  4. Allow implicit trust of all gateways since they are the link to the internet.

Answer(s): B


Reference:

https://www.bmc.com/blogs/osi-model-7-layers/



Which of the following methods is an IoT portal administrator most likely to use in order to mitigate Distributed Denial of Service (DDoS) attacks?

  1. Implement Domain Name System Security Extensions (DNSSEC) on all Internet-facing name servers
  2. Disable Network Address Translation Traversal (NAT-T) at the border firewall
  3. Implement traffic scrubbers on the upstream Internet Service Provider (ISP) connection
  4. Require Internet Protocol Security (IPSec) for all inbound portal connections

Answer(s): C


Reference:

https://www.computerweekly.com/news/252456702/How-traffic-scrubbing-can-guard- against-DDoS-attacks






Post your Comments and Discuss CertNexus ITS-110 exam prep with other Community members:

Join the ITS-110 Discussion