Free ITS-110 Exam Braindumps (page: 8)

Page 7 of 26

Which of the following describes the most significant risk created by implementing unverified certificates on an IoT portal?

  1. The portal's Internet Protocol (IP) address can more easily be spoofed.
  2. Domain Name System (DNS) address records are more susceptible to hijacking.
  3. The portal's administrative functions do not require authentication.
  4. Man-in-the-middle (MITM) attacks can be used to eavesdrop on communications.

Answer(s): D



Which of the following is the BEST encryption standard to implement for securing bulk data?

  1. Triple Data Encryption Standard (3DES)
  2. Advanced Encryption Standard (AES)
  3. Rivest Cipher 4 (RC4)
  4. Elliptic curve cryptography (ECC)

Answer(s): B



Which of the following encryption standards should an IoT developer select in order to implement an asymmetric key pair?

  1. Temporal Key Integrity Protocol (TKIP)
  2. Elliptic curve cryptography (ECC)
  3. Advanced Encryption Standard (AES)
  4. Triple Data Encryption Standard (3DES)

Answer(s): B



An IoT systems administrator wants to ensure that all data stored on remote IoT gateways is unreadable.
Which of the following technologies is the administrator most likely to implement?

  1. Secure Hypertext Transmission Protocol (HTTPS)
  2. Internet Protocol Security (IPSec)
  3. Triple Data Encryption Standard (3DES)
  4. Message Digest 5 (MD5)

Answer(s): B






Post your Comments and Discuss CertNexus ITS-110 exam with other Community members:

ITS-110 Discussions & Posts