Free ITS-110 Exam Braindumps (page: 5)

Page 4 of 26

An IoT systems administrator needs to be able to detect packet injection attacks.
Which of the follow methods or technologies is the administrator most likely to implement?

  1. Internet Protocol Security (IPSec) with Encapsulating Security Payload (ESP)
  2. Point-to-Point Tunneling Protocol (PPTP)
  3. Layer 2 Tunneling Protocol (L2TP)
  4. Internet Protocol Security (IPSec) with Authentication Headers (AH)

Answer(s): D


Reference:

https://www.techtarget.com/searchsecurity/definition/IPsec-Internet-Protocol-Security



An IoT developer wants to ensure all sensor to portal communications are as secure as possible and do not require any client-side configuration.
Which of the following is the developer most likely to use?

  1. Virtual Private Networking (VPN)
  2. Public Key Infrastructure (PKI)
  3. IP Security (IPSec)
  4. Secure/Multipurpose Internet Mail Extensions (S/MIME)

Answer(s): C



An IoT security practitioner should be aware of which common misconception regarding data in motion?

  1. That transmitted data is point-to-point and therefore a third party does not exist.
  2. The assumption that all data is encrypted properly and cannot be exploited.
  3. That data can change instantly so old data is of no value.
  4. The assumption that network protocols automatically encrypt data on the fly.

Answer(s): B



A hacker is able to eavesdrop on administrative sessions to remote IoT sensors.
Which of the following has most likely been misconfigured or disabled?

  1. Secure Shell (SSH)
  2. Internet Protocol Security (IPSec)
  3. Telnet
  4. Virtual private network (VPN)

Answer(s): B






Post your Comments and Discuss CertNexus ITS-110 exam with other Community members:

ITS-110 Discussions & Posts