CertNexus ITS-110 Exam Practice Questions (P. 1)
- Full Access (100 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
Which of the following attacks utilizes Media Access Control (MAC) address spoofing?
- ANetwork Address Translation (NAT)
- BMan-in-the-middle (MITM)
- CNetwork device fuzzing
- DUnsecured network ports
Correct Answer:
B
B
send
light_mode
delete
Question #2
In order to successfully perform a man-in-the-middle (MITM) attack against a secure website, which of the following could be true?
- AClient to server traffic must use Hypertext Transmission Protocol (HTTP)
- BThe server must be vulnerable to malformed Uniform Resource Locator (URL) injection
- CThe server must be using a deprecated version of Transport Layer Security (TLS)
- DThe web server's X.509 certificate must be compromised
Correct Answer:
C
C
send
light_mode
delete
Question #3
An IoT security administrator wishes to mitigate the risk of falling victim to Distributed Denial of Service (DDoS) attacks. Which of the following mitigation strategies should the security administrator implement? (Choose two.)
- ABlock all inbound packets with an internal source IP address
- BBlock all inbound packets originating from service ports
- CEnable unused Transmission Control Protocol (TCP) service ports in order to create a honeypot
- DBlock the use of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) through his perimeter firewall
- ERequire the use of X.509 digital certificates for all incoming requests
Correct Answer:
DE
DE
send
light_mode
delete
Question #4
An IoT security administrator is concerned about an external attacker using the internal device management local area network (LAN) to compromise his IoT devices. Which of the following countermeasures should the security administrator implement? (Choose three.)
- ARequire the use of Password Authentication Protocol (PAP)
- BCreate a separate management virtual LAN (VLAN)
- CEnsure that all IoT management servers are running antivirus software
- DImplement 802.1X for authentication
- EEnsure that the Time To Live (TTL) flag for outgoing packets is set to 1
- FOnly allow outbound traffic from the management LAN
- GEnsure that all administrators access the management server at specific times
Correct Answer:
BDG
BDG
send
light_mode
delete
Question #5
Which of the following attacks is a reflected Distributed Denial of Service (DDoS) attack?
send
light_mode
delete
All Pages