Free ITS-110 Exam Braindumps (page: 7)

Page 6 of 26

A security practitioner wants to encrypt a large datastore.
Which of the following is the BEST choice to implement?

  1. Asymmetric encryption standards
  2. Symmetric encryption standards
  3. Elliptic curve cryptography (ECC)
  4. Diffie-Hellman (DH) algorithm

Answer(s): B



An IoT security administrator wants to encrypt the database used to store sensitive IoT device dat

  1. Which of the following algorithms should he choose?
  2. Triple Data Encryption Standard (3DES)
  3. ElGamal
  4. Rivest-Shamir-Adleman (RSA)
  5. Secure Hash Algorithm 3-512 (SHA3-512)

Answer(s): B



Which of the following technologies allows for encryption of networking communications without requiring any configuration on IoT endpoints?

  1. Transport Layer Security (TLS)
  2. Internet Protocol Security (IPSec)
  3. Virtual private network (VPN)
  4. Elliptic curve cryptography (ECC)

Answer(s): C



Accompany collects and stores sensitive data from thousands of IoT devices. The company's IoT security administrator is concerned about attacks that compromise confidentiality.
Which of the following attacks is the security administrator concerned about? (Choose two.)

  1. Salami
  2. Aggregation
  3. Data diddling
  4. Denial of Service (DoS)
  5. Inference

Answer(s): B,E






Post your Comments and Discuss CertNexus ITS-110 exam with other Community members:

ITS-110 Discussions & Posts