CertNexus ITS-110 Exam (page: 2)
CertNexus Certified Internet of Things Security Practitioner
Updated on: 25-Dec-2025

Viewing Page 2 of 21

An IoT security architect wants to implement Bluetooth between two nodes. The Elliptic Curve Diffie- Hellman (ECDH) cipher suite has been identified as a requirement.
Which of the following Bluetooth versions can meet this requirement?

  1. Bluetooth Low Energy (BLE) v4.0
  2. BLE v4.2
  3. BLE v4.1
  4. Any of the BLE versions

Answer(s): D


Reference:

https://www.symmetryelectronics.com/blog/ble-4-1-vs-ble-4-2-new-features-and- advantages/



An IoT security administrator realizes that when he attempts to visit the administrative website for his devices, he is sent to a fake website. To which of the following attacks has he likely fallen victim?

  1. Buffer overflow
  2. Denial of Service (DoS)
  3. Birthday attack
  4. Domain name system (DNS) poisoning

Answer(s): D



Network filters based on Ethernet burned-in-addresses are vulnerable to which of the following attacks?

  1. Media Access Control (MAC) spoofing
  2. Buffer overflow
  3. Packet injection
  4. GPS spoofing

Answer(s): A



An IoT security architect needs to minimize the security risk of a radio frequency (RF) mesh application.
Which of the following might the architect consider as part of the design?

  1. Make pairing between nodes very easy so that troubleshooting is reduced.
  2. Encrypt data transmission between nodes at the physical/logical layers.
  3. Prevent nodes from being rejected to keep the value of the network as high as possible.
  4. Allow implicit trust of all gateways since they are the link to the internet.

Answer(s): B


Reference:

https://www.bmc.com/blogs/osi-model-7-layers/



Which of the following methods is an IoT portal administrator most likely to use in order to mitigate Distributed Denial of Service (DDoS) attacks?

  1. Implement Domain Name System Security Extensions (DNSSEC) on all Internet-facing name servers
  2. Disable Network Address Translation Traversal (NAT-T) at the border firewall
  3. Implement traffic scrubbers on the upstream Internet Service Provider (ISP) connection
  4. Require Internet Protocol Security (IPSec) for all inbound portal connections

Answer(s): C


Reference:

https://www.computerweekly.com/news/252456702/How-traffic-scrubbing-can-guard- against-DDoS-attacks



Viewing Page 2 of 21



Share your comments for CertNexus ITS-110 exam with other users:

Bsmaind 8/20/2023 9:22:00 AM

hello nice dumps
Anonymous


beau 1/12/2024 4:53:00 PM

good resource for learning
UNITED STATES


Sandeep 12/29/2023 4:07:00 AM

very useful
Anonymous


kevin 9/29/2023 8:04:00 AM

physical tempering techniques
Anonymous


Blessious Phiri 8/15/2023 4:08:00 PM

its giving best technical knowledge
Anonymous


Testbear 6/13/2023 11:15:00 AM

please upload
ITALY


shime 10/24/2023 4:23:00 AM

great question with explanation thanks!!
ETHIOPIA


Thembelani 5/30/2023 2:40:00 AM

does this exam have lab sections?
Anonymous


Shin 9/8/2023 5:31:00 AM

please upload
PHILIPPINES


priti kagwade 7/22/2023 5:17:00 AM

please upload the braindump for .net
UNITED STATES


Robe 9/27/2023 8:15:00 PM

i need this exam 1z0-1107-2. please.
Anonymous


Chiranthaka 9/20/2023 11:22:00 AM

very useful!
Anonymous


Not Miguel 11/26/2023 9:43:00 PM

for this question - "which three type of basic patient or member information is displayed on the patient info component? (choose three.)", list of conditions is not displayed (it is displayed in patient card, not patient info). so should be thumbnail of chatter photo
Anonymous


Andrus 12/17/2023 12:09:00 PM

q52 should be d. vm storage controller bandwidth represents the amount of data (in terms of bandwidth) that a vms storage controller is using to read and write data to the storage fabric.
Anonymous


Raj 5/25/2023 8:43:00 AM

nice questions
UNITED STATES


max 12/22/2023 3:45:00 PM

very useful
Anonymous


Muhammad Rawish Siddiqui 12/8/2023 6:12:00 PM

question # 208: failure logs is not an example of operational metadata.
SAUDI ARABIA


Sachin Bedi 1/5/2024 4:47:00 AM

good questions
Anonymous


Kenneth 12/8/2023 7:34:00 AM

thank you for the test materials!
KOREA REPUBLIC OF


Harjinder Singh 8/9/2023 4:16:00 AM

its very helpful
HONG KONG


SD 7/13/2023 12:56:00 AM

good questions
UNITED STATES


kanjoe 7/2/2023 11:40:00 AM

good questons
UNITED STATES


Mahmoud 7/6/2023 4:24:00 AM

i need the dumb of the hcip security v4.0 exam
EGYPT


Wei 8/3/2023 4:18:00 AM

upload the dump please
HONG KONG


Stephen 10/3/2023 6:24:00 PM

yes, iam looking this
AUSTRALIA


Stephen 8/4/2023 9:08:00 PM

please upload cima e2 managing performance dumps
Anonymous


hp 6/16/2023 12:44:00 AM

wonderful questions
Anonymous


Priyo 11/14/2023 2:23:00 AM

i used this site since 2000, still great to support my career
INDONESIA


Jude 8/29/2023 1:56:00 PM

why is the answer to "which of the following is required by scrum?" all of the following stated below since most of them are not mandatory? sprint retrospective. members must be stand up at the daily scrum. sprint burndown chart. release planning.
UNITED STATES


Marc blue 9/15/2023 4:11:00 AM

great job. hope this helps out.
UNITED STATES


Anne 9/13/2023 2:33:00 AM

upload please. many thanks!
Anonymous


pepe el toro 9/12/2023 7:55:00 PM

this is so interesting
Anonymous


Antony 11/28/2023 12:13:00 AM

great material thanks
AUSTRALIA


Thembelani 5/30/2023 2:22:00 AM

anyone who wrote this exam recently
Anonymous