CertNexus ITS-110 Exam Actual Questions

The questions for ITS-110 were last updated on Dec. 4, 2024.
  • Viewing page 1 out of 25 pages.
  • Viewing questions 1-4 out of 100 questions

Topic 1 - Exam A

Question #1 Topic 1

Which of the following attacks utilizes Media Access Control (MAC) address spoofing?

  • A. Network Address Translation (NAT)
  • B. Man-in-the-middle (MITM)
  • C. Network device fuzzing
  • D. Unsecured network ports
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #2 Topic 1

In order to successfully perform a man-in-the-middle (MITM) attack against a secure website, which of the following could be true?

  • A. Client to server traffic must use Hypertext Transmission Protocol (HTTP)
  • B. The server must be vulnerable to malformed Uniform Resource Locator (URL) injection
  • C. The server must be using a deprecated version of Transport Layer Security (TLS)
  • D. The web server's X.509 certificate must be compromised
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Question #3 Topic 1

An IoT security administrator wishes to mitigate the risk of falling victim to Distributed Denial of Service (DDoS) attacks. Which of the following mitigation strategies should the security administrator implement? (Choose two.)

  • A. Block all inbound packets with an internal source IP address
  • B. Block all inbound packets originating from service ports
  • C. Enable unused Transmission Control Protocol (TCP) service ports in order to create a honeypot
  • D. Block the use of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) through his perimeter firewall
  • E. Require the use of X.509 digital certificates for all incoming requests
Reveal Solution Hide Solution   Discussion  

Correct Answer: DE 🗳️

Question #4 Topic 1

An IoT security administrator is concerned about an external attacker using the internal device management local area network (LAN) to compromise his IoT devices. Which of the following countermeasures should the security administrator implement? (Choose three.)

  • A. Require the use of Password Authentication Protocol (PAP)
  • B. Create a separate management virtual LAN (VLAN)
  • C. Ensure that all IoT management servers are running antivirus software
  • D. Implement 802.1X for authentication
  • E. Ensure that the Time To Live (TTL) flag for outgoing packets is set to 1
  • F. Only allow outbound traffic from the management LAN
  • G. Ensure that all administrators access the management server at specific times
Reveal Solution Hide Solution   Discussion  

Correct Answer: BDG 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...