A hacker is able to extract users' names, birth dates, height, and weight from an IoT manufacturer's user portal. Which of the following types of data has been compromised?
A. Personal health information
B. Personal identity information
C. Personally identifiable information
D. Protected health information
正解:C
質問 2:
Which of the following functions can be added to the authorization component of AAA to enable the principal of least privilege with flexibility?
A. Access control list (ACL)
B. Role-based access control (RBAC)
C. Discretionary access control (DAC)
D. Mandatory access control (MAC)
正解:B
質問 3:
An IoT security administrator wishes to mitigate the risk of falling victim to Distributed Denial of Service (DDoS) attacks. Which of the following mitigation strategies should the security administrator implement? (Choose two.)
A. Block all inbound packets with an internal source IP address
B. Block the use of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) through his perimeter firewall
C. Require the use of X.509 digital certificates for all incoming requests
D. Block all inbound packets originating from service ports
E. Enable unused Transmission Control Protocol (TCP) service ports in order to create a honeypot
正解:B,C
質問 4:
An IoT security administrator is determining which cryptographic algorithm she should use to sign her server's digital certificates. Which of the following algorithms should she choose?
A. Diffie-Hellman (DH)
B. Rivest Cipher 6 (RC6)
C. Rivest-Shamir-Adleman (RSA)
D. Rijndael
正解:C
質問 5:
An IoT system administrator discovers that hackers are using rainbow tables to compromise user accounts on their cloud management portal. What should the administrator do in order to mitigate this risk?
A. Implement robust password policies
B. Implement URL filtering
C. Implement granular role-based access
D. Implement certificates on all login pages
正解:C
質問 6:
An IoT software developer wants the users of her software tools to know if they have been modified by someone other than her. Which of the following tools or techniques should she use?
A. Encryption
B. Fuzzing
C. Hashing
D. Obfuscation
正解:C
森口** -
Pass4Testさんはいつもお世話になっております。一発目で合格できました。このITS-110問題集だけの勉強です。さすがPass4Test、一発合格を目的にした問題集だけあります。効率よく勉強ができました!