CertNexus ITS-110 Exam
Certified Internet of Things Security Practitioner (Page 4 )

Updated On: 7-Feb-2026

A DevOps engineer wants to provide secure network services to an IoT/cloud solution.
Which of the following countermeasures should be implemented to mitigate network attacks that can render a network useless?

  1. Network firewall
  2. Denial of Service (DoS)/Distributed Denial of Service (DDoS) mitigation
  3. Web application firewall (WAF)
  4. Deep Packet Inspection (DPI)

Answer(s): B


Reference:

https://www.cloudflare.com/learning/ddos/what-is-a-ddos- attack/#:~:text=A%20distributed%20denial%2Dof%2Dservice,a%20flood%20of%20Internet%20traffic



What is one popular network protocol that is usually enabled by default on home routers that creates a large attack surface?

  1. Open virtual private network (VPN)
  2. Universal Plug and Play (UPnP)
  3. Network Address Translation (NAT)
  4. Domain Name System Security Extensions (DNSSEC)

Answer(s): B


Reference:

https://phoenixnap.com/blog/what-is-upnp



An IoT systems administrator needs to be able to detect packet injection attacks.
Which of the follow methods or technologies is the administrator most likely to implement?

  1. Internet Protocol Security (IPSec) with Encapsulating Security Payload (ESP)
  2. Point-to-Point Tunneling Protocol (PPTP)
  3. Layer 2 Tunneling Protocol (L2TP)
  4. Internet Protocol Security (IPSec) with Authentication Headers (AH)

Answer(s): D


Reference:

https://www.techtarget.com/searchsecurity/definition/IPsec-Internet-Protocol-Security



An IoT developer wants to ensure all sensor to portal communications are as secure as possible and do not require any client-side configuration.
Which of the following is the developer most likely to use?

  1. Virtual Private Networking (VPN)
  2. Public Key Infrastructure (PKI)
  3. IP Security (IPSec)
  4. Secure/Multipurpose Internet Mail Extensions (S/MIME)

Answer(s): C



An IoT security practitioner should be aware of which common misconception regarding data in motion?

  1. That transmitted data is point-to-point and therefore a third party does not exist.
  2. The assumption that all data is encrypted properly and cannot be exploited.
  3. That data can change instantly so old data is of no value.
  4. The assumption that network protocols automatically encrypt data on the fly.

Answer(s): B






Post your Comments and Discuss CertNexus ITS-110 exam prep with other Community members:

Join the ITS-110 Discussion