A DevOps engineer wants to provide secure network services to an IoT/cloud solution. Which of the
following countermeasures should be implemented to mitigate network attacks that can render a
network useless?
B
Explanation:
Reference:
https://www.cloudflare.com/learning/ddos/what-is-a-ddos-
attack/#:~:text=A%20distributed%20denial%2Dof%2Dservice,a%20flood%20of%20Internet%20traffic
What is one popular network protocol that is usually enabled by default on home routers that
creates a large attack surface?
B
Explanation:
Reference: https://phoenixnap.com/blog/what-is-upnp
An IoT systems administrator needs to be able to detect packet injection attacks. Which of the follow
methods or technologies is the administrator most likely to implement?
D
Explanation:
Reference: https://www.techtarget.com/searchsecurity/definition/IPsec-Internet-Protocol-Security
An IoT developer wants to ensure all sensor to portal communications are as secure as possible and
do not require any client-side configuration. Which of the following is the developer most likely to
use?
C
An IoT security practitioner should be aware of which common misconception regarding data in
motion?
B
A hacker is able to eavesdrop on administrative sessions to remote IoT sensors. Which of the
following has most likely been misconfigured or disabled?
B
A corporation's IoT security administrator has configured his IoT endpoints to send their data directly
to a database using Secure Sockets Layer (SSL)/Transport Layer Security (TLS). Which entity provides
the symmetric key used to secure the data in transit?
B
An IoT security architect needs to secure data in motion. Which of the following is a common
vulnerability used to exploit unsecure data in motion?
B
An IoT security administrator is determining which cryptographic algorithm she should use to sign
her server's digital certificates. Which of the following algorithms should she choose?
D
An IoT gateway will be brokering data on numerous northbound and southbound interfaces. A
security practitioner has the data encrypted while stored on the gateway and encrypted while
transmitted across the network. Should this person be concerned with privacy while the data is in
use?
B