Which of the following attacks utilizes Media Access Control (MAC) address spoofing?
Answer(s): B
https://www.comparitech.com/net-admin/spoofing-attacks-guide/
In order to successfully perform a man-in-the-middle (MITM) attack against a secure website, which of the following could be true?
Answer(s): C
https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/
An IoT security administrator wishes to mitigate the risk of falling victim to Distributed Denial of Service (DDoS) attacks. Which of the following mitigation strategies should the security administrator implement? (Choose two.)
Answer(s): D,E
An IoT security administrator is concerned about an external attacker using the internal device management local area network (LAN) to compromise his IoT devices. Which of the following countermeasures should the security administrator implement? (Choose three.)
Answer(s): B,D,G
Post your Comments and Discuss CertNexus ITS-110 exam with other Community members:
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the ITS-110 content, but please register or login to continue.