ITS-210 Dumps ITS-210 Braindumps ITS-210 Real Questions ITS-210 Practice Test ITS-210 Actual Questions CertNexus ITS-210 Certified Internet of Things Security Practitioner (CIoTSP) https://killexams.com/pass4sure/exam-detail/ITS-210 Question: 20 A web application is connected to an IoT endpoint. A hacker wants to steal data from the connection between them. Which of the following is NOT a method of attack that could be used to facilitate stealing data? A. Cross-Site Request Forgery (CSRF) B. SQL Injection (SQLi) C. Cross-Site Scripting (XSS) D. LDAP Injection Answer: D Question: 21 If a site administrator wants to improve the secure access to a cloud portal, which of the following would be the BEST countermeasure to implement? A. Require frequent password changes B. Mandate multi-factor authentication (MFA) C. Utilize role-based access control (RBAC) D. Require separation of duties Answer: C Question: 22 An IoT developer discovers that clients frequently fall victim to phishing attacks. What should the developer do in order to ensure that customer accounts cannot be accessed even if the customer's password has been compromised? A. Implement two-factor authentication (2FA) B. Enable Kerberos authentication C. Implement account lockout policies D. Implement Secure Lightweight Directory Access Protocol (LDAPS) Answer: A Question: 23 An IoT security practitioner should be aware of which common misconception regarding data in motion? A. That transmitted data is point-to-point and therefore a third party does not exist. B. The assumption that all data is encrypted properly and cannot be exploited. C. That data can change instantly so old data is of no value. D. The assumption that network protocols automatically encrypt data on the fly. Answer: B Question: 24 In order to successfully perform a man-in-the-middle (MITM) attack against a secure website, which of the following could be true? A. Client to server traffic must use Hypertext Transmission Protocol (HTTP) B. The server must be vulnerable to malformed Uniform Resource Locator (URL) injection C. The server must be using a deprecated version of Transport Layer Security (TLS) D. The web server's E. 509 certificate must be compromised Answer: C Explanation: Reference: https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/ Question: 25 Which of the following attacks is a reflected Distributed Denial of Service (DDoS) attack? A. Teardrop B. Ping of Death C. SYN flood D. Smurf Answer: C Explanation: Reference: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/ Question: 26 The network administrator for an organization has read several recent articles stating that replay attacks are on the rise. Which of the following secure protocols could the administrator implement to prevent replay attacks via remote workersâ VPNs? (Choose three.) A. Internet Protocol Security (IPSec) B. Enhanced Interior Gateway Routing Protocol (EIGRP) C. Password Authentication Protocol (PAP) D. Challenge Handshake Authentication Protocol (CHAP) E. Simple Network Management Protocol (SNMP) F. Layer 2 Tunneling Protocol (L2TP) G. Interior Gateway Routing Protocol (IGRP) Answer: A,D,F Question: 27 Which of the following tools or techniques is used by software developers to maintain code, but also used by hackers to maintain control of a compromised system? A. Disassembler B. Backdoor C. Debugger D. Stack pointer Answer: B Question: 28 Passwords should be stored⊠A. For no more than 30 days. B. Only in cleartext. C. As a hash value. D. Inside a digital certificate. Answer: C Explanation: Reference: https://snyk.io/learn/password-storage-best-practices/ Question: 29 If an attacker were able to gain access to a user's machine on your network, which of the following actions would she most likely take next? A. Start log scrubbing B. Escalate privileges C. Perform port scanning D. Initiate reconnaissance Answer: C Question: 30 Which of the following is the BEST encryption standard to implement for securing bulk data? A. Triple Data Encryption Standard (3DES) B. Advanced Encryption Standard (AES) C. Rivest Cipher 4 (RC4) D. Elliptic curve cryptography (ECC) Answer: B Question: 31 A user grants an IoT manufacturer consent to store personally identifiable information (PII). According to the General Data Protection Regulation (GDPR), when is an organization required to delete this data? A. Within ninety days after collection, unless required for a legal proceeding B. Within thirty days of a user's written request C. Within seven days of being transferred to secure, long-term storage D. Within sixty days after collection, unless encrypted Answer: B Question: 32 An OT security practitioner wants to implement two-factor authentication (2FA). Which of the following is the least secure method to use for implementation? A. Out-of-band authentication (OOBA) B. 2FA over Short Message Service (SMS) C. Authenticator Apps for smartphones D. Fast Identity Online (FIDO) Universal 2nd Factor (U2F) USB key Answer: B Question: 33 An IoT system administrator discovers that unauthorized users are able to log onto and access data on remote IoT monitoring devices. What should the system administrator do on the remote devices in order to address this issue? A. Encrypt all locally stored data B. Ensure all firmware updates have been applied C. Change default passwords D. Implement URL filtering Answer: C Question: 34 An IoT security administrator realizes that when he attempts to visit the administrative website for his devices, he is sent to a fake website. To which of the following attacks has he likely fallen victim? A. Buffer overflow B. Denial of Service (DoS) C. Birthday attack D. Domain name system (DNS) poisoning Answer: D Question: 35 Which of the following technologies allows for encryption of networking communications without requiring any configuration on IoT endpoints? A. Transport Layer Security (TLS) B. Internet Protocol Security (IPSec) C. Virtual private network (VPN) D. Elliptic curve cryptography (ECC) Answer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