Free ITS-110 Exam Braindumps (page: 6)

Page 5 of 26

A corporation's IoT security administrator has configured his IoT endpoints to send their data directly to a database using Secure Sockets Layer (SSL)/Transport Layer Security (TLS).
Which entity provides the symmetric key used to secure the data in transit?

  1. The administrator's machine
  2. The database server
  3. The Key Distribution Center (KDC)
  4. The IoT endpoint

Answer(s): B



An IoT security architect needs to secure data in motion.
Which of the following is a common vulnerability used to exploit unsecure data in motion?

  1. External flash access
  2. Misconfigured Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
  3. Databases and datastores
  4. Lack of memory space isolation

Answer(s): B



An IoT security administrator is determining which cryptographic algorithm she should use to sign her server's digital certificates.
Which of the following algorithms should she choose?

  1. Rivest Cipher 6 (RC6)
  2. Rijndael
  3. Diffie-Hellman (DH)
  4. Rivest-Shamir-Adleman (RSA)

Answer(s): D



An IoT gateway will be brokering data on numerous northbound and southbound interfaces. A security practitioner has the data encrypted while stored on the gateway and encrypted while transmitted across the network. Should this person be concerned with privacy while the data is in use?

  1. Yes, because the hash wouldn't protect the integrity of the data.
  2. Yes, because the data is vulnerable during processing.
  3. No, since the data is already encrypted while at rest and while in motion.
  4. No, because the data is inside the CPU's secure region while being used.

Answer(s): B






Post your Comments and Discuss CertNexus ITS-110 exam with other Community members:

ITS-110 Discussions & Posts