Study Smarter for the CertNexus ITS 110 Exam with Our Free and Reliable ITS 110 Exam Questions โ Updated for 2025.
At Cert Empire, we are focused on delivering the most accurate and up-to-date exam questions for students preparing for the CertNexus ITS 110 Exam. To make preparation easier, weโve made parts of our Agentforce Specialist exam resources free for everyone. You can practice as much as you like with CertNexus ITS 110.
Question 1
Show Answer
A. Network Address Translation (NAT) is a standard networking method for remapping IP addresses and is not an attack that involves MAC spoofing.
C. Network device fuzzing is a software testing technique that involves sending malformed data to a device to discover vulnerabilities, not impersonating a device via its MAC address.
D. Unsecured network ports represent a physical layer vulnerability, not a specific attack technique that inherently utilizes MAC spoofing.
1. National Institute of Standards and Technology (NIST). (2008). Technical Guide to Information Security Testing and Assessment (NIST Special Publication 800-115). Section 4.3.2, "Network Sniffing," describes how ARP spoofing is used to redirect traffic for sniffing, a fundamental component of MITM attacks. The document states, "ARP spoofing involves constructing a large number of forged ARP request and reply packets to overload network switches." This forgery relies on manipulating MAC-to-IP mappings.
2. Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.). Pearson. Chapter 8, "Security in Computer Networks," discusses MITM attacks and ARP poisoning, explaining that an attacker can send ARP messages with a spoofed source MAC address to poison the ARP caches of other hosts on the subnet, thereby redirecting traffic. (Specific discussion on ARP poisoning as a MITM vector).
3. Al-Shaer, E., & El-Atawy, A. (2009). Network Security: A Top-Down Approach. In Proceedings of the 14th ACM symposium on Access control models and technologies (pp. 143-152). ACM. The paper discusses various network attacks, explicitly linking ARP poisoning (which uses MAC spoofing) as a primary method for launching Man-in-the-Middle attacks on a switched Ethernet LAN. (DOI: https://doi.org/10.1145/1542207.1542230)
Question 2
Show Answer
A. A secure website uses HTTPS, which is encrypted. An MITM attack on unencrypted HTTP is trivial but does not apply to a site that is already considered secure.
B. URL injection is an application-layer vulnerability. It does not directly enable the cryptographic compromise of the TLS-encrypted network channel required for this type of MITM attack.
D. While a compromised certificate also enables an MITM attack, it is a failure of server identity authentication, not a flaw within the encryption protocol itself, which is what deprecated TLS represents.
1. National Institute of Standards and Technology (NIST). (2019). Special Publication (SP) 800-52r2: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. Section 3.1, "TLS Protocol Versions," explicitly states that TLS versions 1.1 and 1.0 are deprecated and must not be used due to security vulnerabilities.
2. Internet Engineering Task Force (IETF). (2015). RFC 7525: Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). Section 3.1.1 discusses the POODLE attack, a well-known MITM attack that exploits a vulnerability in the deprecated SSL 3.0 protocol.
3. Massachusetts Institute of Technology (MIT) OpenCourseWare. (2014). 6.858 Computer Systems Security, Lecture 15: Web Security. The lecture notes detail specific MITM attacks like BEAST and POODLE, which directly exploit weaknesses in older versions of TLS (1.0) and SSL, respectively. (Available at MIT OCW website).
Question 3
Show Answer
B. Blocking inbound packets from all service ports is overly broad and could disrupt legitimate traffic, as some services communicate using low-numbered source ports.
C. A honeypot is a system designed to attract and study attackers for threat intelligence purposes; it is not a direct mitigation or blocking mechanism.
D. Blocking all TCP and UDP traffic would cause a complete service outage, which is the goal of a DoS attack, not a method of mitigation.
1. Ferguson, P., & Senie, D. (2000). Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827. IETF. Section 1. This document explicitly states that ingress filtering "prohibits DoS attacks that use forged IP source addresses to be launched from 'behind' an Internet Service Provider's (ISP's) aggregation point."
2. Souppaya, M., & Scarfone, K. (2013). Guide to Security for Full Virtualization Technologies. NIST Special Publication 800-128. National Institute of Standards and Technology. Section 5.5.2, "Network Segmentation and Segregation," recommends ingress filtering "to protect the organization from certain DoS attacks."
3. Mahjabin, T., Xiao, Y., Sun, G., & Jiang, W. (2017). A survey of distributed denial-of-service attack, prevention, and mitigation techniques. International Journal of Distributed Sensor Networks, 13(12). https://doi.org/10.1177/1550147717741463. The section "Application Layer DDoS Attack Prevention and Mitigation" discusses the use of authentication and cryptographic puzzles to differentiate legitimate users from attackers, which aligns with the principle of requiring client-side X.509 certificates.
Question 4
An IoT security administrator is concerned about an external attacker using the internal device management local area network (LAN) to compromise his IoT devices. Which of the following countermeasures should the security administrator implement? (Choose three.)
Show Answer
A. Requiring the use of Password Authentication Protocol (PAP) is insecure as it transmits passwords in cleartext, which would increase the risk of compromise, not mitigate it.
C. While antivirus on servers is a good security practice, it is a host-based control and does not prevent an attacker from gaining access to the management network itself.
F. Only allowing outbound traffic is an incomplete firewall strategy; it does not prevent an attacker already on an adjacent internal network from initiating inbound connections to the management LAN.
G. Restricting access to specific times is a weak administrative control that can be bypassed if an attacker compromises credentials; it does not secure the network layer.
1. VLANs for Segmentation (B): National Institute of Standards and Technology (NIST), Special Publication 800-207, "Zero Trust Architecture," Section 3.2.1, discusses micro-segmentation using VLANs to isolate network resources and prevent lateral movement. It states, "This can be accomplished via gateways and/or network segmentation. These gateways can be implemented as virtual or physical devices... VLANs can also be used to segment a network."
2. 802.1X for Authentication (D): Carnegie Mellon University, Software Engineering Institute, "Limiting Network Access with 802.1X," emphasizes its role in security: "IEEE 802.1X is a standard for port-based network access control (PNAC). It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN." This prevents unauthorized devices from connecting to the secured management network.
3. TTL for Containment (E): Internet Engineering Task Force (IETF), RFC 5082, "The Generalized TTL Security Mechanism (GTSM)," Section 1, describes using TTL to protect against remote attacks. "The Generalized TTL Security Mechanism (GTSM) is a mechanism to protect a protocol from CPU-utilization-based attacks... by checking whether the TTL of a received packet has an expected value. The check is based on the fact that most attacks from outside the network will have a lower TTL..." Setting TTL to 1 ensures packets are confined to the local segment.
Question 5
Show Answer
A. Teardrop is a fragmentation attack that sends malformed, overlapping IP fragments to crash the target's operating system during reassembly; it is not a reflected attack.
B. Ping of Death is a legacy DoS attack that sends an oversized ICMP packet, causing a buffer overflow and system crash; it is not a reflected attack.
C. A SYN flood is a resource exhaustion attack that exploits the TCP three-way handshake by sending a high volume of SYN packets, but it does not use intermediary reflectors.
1. Kaur, J., & Singh, K. (2016). A study of DoS and DDoS attacks. In 2016 International Conference on Computing, Communication and Automation (ICCCA) (pp. 1360-1365). IEEE. DOI: 10.1109/CCAA.2016.7813969. (This paper categorizes the Smurf attack under "Reflected Attacks" in Table 1, while SYN Flood is categorized under "Protocol Exploits".)
2. CERT Coordination Center. (1998, January 5). CERTยฎ Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks. Carnegie Mellon University. Retrieved from https://resources.sei.cmu.edu/assetfiles/certadvisory/1998001.pdf. (Section "II. Description" explains the mechanism: "The source address of the packet is forged to be the intended victim... The result is that the victim is flooded with echo reply packets.")
3. Kurose, J. F., & Ross, K. W. (2021). Computer Networking: A Top-Down Approach (8th ed.). Pearson. (In Section 1.5.2, "Denial-of-Service (DoS) Attacks," the text describes how attackers can spoof their source address and explains amplification attacks like the Smurf attack, which reflects traffic off multiple hosts.)
Question 6
Show Answer
A. Bluetooth Low Energy (BLE) v4.0: This version uses LE Legacy Pairing, which does not support the ECDH cipher suite for key exchange.
C. BLE v4.1: This version also relies on the older LE Legacy Pairing method and lacks the required ECDH support.
D. Any of the BLE versions: This is incorrect because support for ECDH was a specific enhancement introduced in version 4.2, not a feature of earlier versions.
1. Bluetooth Special Interest Group (SIG). Bluetooth Core Specification Version 4.2. Vol. 3, Part H, Section 2.1 "Pairing Methods". This section officially introduces LE Secure Connections, contrasting it with LE legacy pairing. Section 2.3.5.6 "LE Secure Connections pairing phase 2" explicitly details the ECDH public key exchange process.
2. National Institute of Standards and Technology (NIST). NIST Special Publication 800-121 Revision 2: Guide to Bluetooth Security. (May 2017). Section 4.3.2, "LE Secure Connections Pairing," states, "LE Secure Connections pairing was introduced in Bluetooth v4.2... LE Secure Connections pairing uses Elliptic Curve Diffie-Hellman (ECDH) public key cryptography for key generation..."
3. Padgette, J., Bahr, J., Batra, M., Holtmann, M., Smith, R., Chen, L., & Scarfone, K. (2016). A Survey of Bluetooth Low Energy Security. This academic survey, often cited in security research, notes on page 4: "Bluetooth 4.2 introduced a new pairing procedure called LE Secure Connections... LE Secure Connections uses Elliptic Curve Diffie-Hellman (ECDH) key exchange..." (Available via arXiv:1602.02929).
Question 7
Show Answer
A. Buffer overflow: This is a memory-based vulnerability exploitation technique used to execute arbitrary code or crash a system, not to redirect network traffic via domain names.
B. Denial of Service (DoS): This type of attack aims to make a network resource or website unavailable to its intended users, typically by flooding it with traffic, rather than redirecting users to a different site.
C. Birthday attack: This is a cryptographic attack that exploits probability theory to find collisions in hash functions, primarily used for forging digital signatures, and is unrelated to website redirection.
1. Stallings, W., & Brown, L. (2018). Computer Security: Principles and Practice (4th ed.). Pearson. In Chapter 21.5, "DNS Attacks," the text describes DNS poisoning as an attack where "an attacker is able to intercept a DNS request and reply with a forged DNS response... The forged response redirects the user to a different Web site."
2. Kuhrer, M., Hupperich, T., Holz, T., & Rossow, C. (2014). Going Wild: Large-Scale Classification of Open DNS Resolvers. In Proceedings of the 2014 Conference on Internet Measurement Conference (IMC '14). Association for Computing Machinery, New York, NY, USA, 233โ246. The paper discusses DNS vulnerabilities, stating, "An attacker can poison the cache of a DNS resolver to redirect clients to a malicious server" (Section 2.1, DNS Cache Poisoning). DOI: https://doi.org/10.1145/2663716.2663733
3. MIT OpenCourseWare. (2014). 6.858 Computer Systems Security, Lecture 15: Network Security. Massachusetts Institute of Technology. The lecture notes explain DNS spoofing: "Goal: get victim to talk to a malicious server, by sending a fake DNS reply with a bad IP address." (Section 3, DNS Spoofing).
4. National Institute of Standards and Technology (NIST). (2010). NIST Special Publication 800-81-2: Secure Domain Name System (DNS) Deployment Guide. Section 2.2, "DNS Vulnerabilities," details how cache poisoning allows an attacker to "redirect unsuspecting users to a malicious Web site."
Question 8
Show Answer
B. Buffer overflow: This is a software vulnerability where a process overwrites memory boundaries. It is unrelated to bypassing network layer 2 hardware address filters.
C. Packet injection: While an attacker might inject packets after spoofing a MAC address, packet injection itself is a broader attack and not the specific vulnerability of the MAC filter.
D. GPS spoofing: This attack involves broadcasting false GPS signals to deceive location-aware devices. It has no relevance to MAC address-based network access control.
1. National Institute of Standards and Technology (NIST). (2012). Guidelines for Securing Wireless Local Area Networks (WLANs) (NIST Special Publication 800-153). Section 4.2.1, "MAC Address Filtering," states, "However, because MAC addresses are sent in the clear, an attacker can easily spoof the MAC address of an authorized client."
2. Kurose, J. F., & Ross, K. W. (2021). Computer Networking: A Top-Down Approach (8th ed.). Pearson. In Chapter 8.3, "Securing Wireless LANs," the text explains that MAC filtering is a weak security measure because "the intruder can learn the MAC addresses of stations that are associated with the AP... and then have his or her station pretend to be one of these stations by spoofing its MAC address."
3. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson. Chapter 17, "Wireless Network Security," discusses the security flaws of early Wi-Fi standards, noting that MAC address filtering is easily defeated by sniffing a valid MAC address and then spoofing it.
Question 9
Show Answer
A. Making pairing "very easy" often bypasses essential authentication steps, which increases the risk of unauthorized nodes joining the network.
C. A secure network must have a mechanism to reject or evict untrusted or compromised nodes to maintain its integrity and security.
D. Implicitly trusting any network component, especially a critical gateway, is a major security flaw that violates the principle of zero trust.
1. National Institute of Standards and Technology (NIST). (2020). IoT Device Cybersecurity Capability Core Baseline (NISTIR 8259A). Section 3.3, Data Protection, states, "The IoT device should have the capability to protect the data it stores and transmits from unauthorized access and modification." This supports the need for encryption for data in transit.
2. IEEE Computer Society. (2020). IEEE Standard for Low-Rate Wireless Networks (IEEE Std 802.15.4-2020). Section 9, "MAC security," specifies the security services for the protocol, including access control, data confidentiality (encryption), and data authenticity. This standard is a foundation for many IoT mesh protocols like Zigbee and Thread.
3. Al-Saidi, R., Al-Khasawneh, M. A., & Al-Bataineh, O. M. (2021). A Comprehensive Review on the Security of IoT Wireless Protocols. In Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2021) (pp. 685-697). Springer, Cham. Section 3.1 discusses IEEE 802.15.4 security, noting that its MAC layer security "provides confidentiality and integrity protection for transmitted data frames using AES-CCM." DOI: https://doi.org/10.1007/978-3-030-76346-663
Question 10
Show Answer
A. DNSSEC authenticates DNS responses to prevent spoofing and cache poisoning; it does not mitigate volumetric traffic floods characteristic of DDoS attacks.
B. Disabling NAT-T impacts the functionality of IPsec VPNs traversing NAT devices and is not a mechanism for mitigating DDoS attacks.
D. IPSec is used to encrypt and authenticate data packets between two endpoints but does not prevent a volumetric attack from overwhelming a server's resources.
1. National Institute of Standards and Technology (NIST). (2012). Special Publication 800-61 Rev. 2, Computer Security Incident Handling Guide. Section 3.4.4, "Denial of Service," states that for large-scale attacks, an organization may need assistance from its ISP, which aligns with the principle of upstream traffic scrubbing. Available at: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
2. Carnegie Mellon University. (2021). 18-730: Introduction to Computer Security, Lecture 15: Network Security & Denial of Service. Course materials discuss DDoS mitigation strategies, highlighting the necessity of upstream filtering (scrubbing) by ISPs or specialized services to handle attacks that exceed the victim's bandwidth.
3. Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39โ53. This foundational academic paper categorizes defense mechanisms by their deployment location, identifying filtering at the "intermediate network" (i.e., within the ISP cloud) as a key strategy, which is the principle behind traffic scrubbing. DOI: https://doi.org/10.1145/997150.997156
Question 11
Show Answer
A. Network firewall: A standard firewall primarily provides access control based on rules. It can be overwhelmed by the sheer volume of traffic in a modern DDoS attack and is not its primary countermeasure.
C. Web application firewall (WAF): A WAF operates at the application layer (Layer 7) to protect against attacks like SQL injection. It does not protect the network infrastructure from volumetric attacks that cause outages.
D. Deep Packet Inspection (DPI): DPI is a technology for examining packet content, not a complete mitigation strategy itself. While it can be a component of a DDoS solution, it is not the overarching countermeasure.
1. University Courseware: Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.). Pearson. In Chapter 1.6, "Network Security," the text describes Denial-of-Service (DoS) attacks as assaults that "render a network, host, or other piece of infrastructure unusable by legitimate users" by flooding the resource with bogus traffic. This aligns directly with the question's scenario.
2. Vendor Documentation: Microsoft Azure. (2023). Overview of Azure DDoS Protection. Microsoft Docs. In the "About Azure DDoS Protection" section, the service is described as defending against "volumetric attacks" and "protocol attacks" that "attempt to make a resource unavailable to legitimate users." This is the specific countermeasure for the threat described.
3. Peer-Reviewed Academic Publication: Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., & Ghani, N. (2019). Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and Defense Mechanisms. IEEE Communications Surveys & Tutorials, 21(2), 1641-1681. In Section IV-A, "Denial of Service (DoS)," the authors state, "The goal of a DoS attack is to make a network resource unavailable to its intended users... In the context of IoT, DoS attacks can render entire networks of devices inoperable." DOI: https://doi.org/10.1109/COMST.2018.2883222
Question 12
Show Answer
A. Open virtual private network (VPN): OpenVPN is a security protocol used to create encrypted tunnels. It is not enabled by default and must be explicitly configured by the user to enhance security.
C. Network Address Translation (NAT): NAT is a fundamental router function that enhances security by hiding internal, private IP addresses from the public internet. It is a security feature, not a vulnerability.
D. Domain Name System Security Extensions (DNSSEC): DNSSEC is a security feature that adds cryptographic authentication to DNS responses. Its purpose is to prevent DNS spoofing, thereby strengthening security, not creating an attack surface.
---
1. Carnegie Mellon University, Software Engineering Institute, CERT Coordination Center. (2001). Vulnerability Note VU#357851: Multiple vendors' UPnP implementations are vulnerable to buffer overflows. CERT/CC. Retrieved from https://www.kb.cert.org/vuls/id/357851. This official vulnerability note details fundamental flaws in UPnP that allow remote attackers to execute arbitrary code, demonstrating its role in creating a large attack surface.
2. University of Michigan, Information and Technology Services. (2023). Secure Your Home Network. Safe Computing. Retrieved from https://safecomputing.umich.edu/be-aware/personal-devices/secure-your-home-network. In the "Secure Your Router" section, the university explicitly recommends disabling UPnP, stating, "This feature is a security risk and is exploited by malware." This serves as guidance from a reputable academic institution on the protocol's inherent risk.
3. Shulman, H., & Waidner, M. (2014). Security of Home-Routers. Fraunhofer Institute for Secure Information Technology SIT. In Section 3.1, "Universal Plug and Play (UPnP)," the paper discusses how UPnP's design allows any local application to open ports, creating a "major security threat" and noting its default-enabled status on many devices.
Question 13
Show Answer
A. IPSec with ESP primarily provides confidentiality through encryption. While it can offer authentication, AH is the protocol specifically designed for integrity and authentication without encryption, making it the most direct answer for detecting packet modification/injection.
B. Point-to-Point Tunneling Protocol (PPTP) is an obsolete and insecure protocol with significant known vulnerabilities and should not be used in modern networks.
C. Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol that does not provide any inherent security. It relies on another protocol, typically IPSec, to secure the data it transports.
1. Internet Engineering Task Force (IETF) RFC 4302, "IP Authentication Header":
Section 1 (Introduction): "The IP Authentication Header (AH) is used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays... Integrity is provided by the use of a Message Authentication Code (MAC), e.g., HMAC-SHA-1. Data origin authentication is provided by the same mechanism." This directly supports AH's role in verifying packet integrity and origin, which is essential for detecting injection.
2. Internet Engineering Task Force (IETF) RFC 4301, "Security Architecture for the Internet Protocol":
Section 4.1 (Security Services): "AH provides data origin authentication and connectionless integrity for IP datagrams (hereafter referred to as 'authentication')." This document, which defines the overall IPSec architecture, clearly designates AH as the protocol for authentication and integrity services.
3. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson.
Chapter 20, Section 20.1 "IPsec Services": This academic textbook, widely used in university curricula, explains that "The Authentication Header (AH) provides support for data integrity and authentication of IP packets... The authentication service confirms that the message was not modified during transmission." This confirms AH's primary function aligns with the question's requirement.
Question 14
Show Answer
A. Virtual Private Networking (VPN): While a VPN provides security, it typically requires a client application and specific configuration on the end device, which violates the "no client-side configuration" requirement.
B. Public Key Infrastructure (PKI): PKI is a framework for managing digital certificates to enable secure communication; it is not a communication protocol itself. It is a necessary component for many security solutions but not the solution in its entirety.
D. Secure/Multipurpose Internet Mail Extensions (S/MIME): S/MIME is a standard designed specifically for encrypting and signing email messages. It is not a suitable protocol for securing general-purpose IoT sensor-to-portal data streams.
---
1. Internet Engineering Task Force (IETF). (2005). RFC 4301: Security Architecture for the Internet Protocol. Section 2.1, "Benefits of IPsec." The document states, "IPsec can be implemented in a firewall or router to provide strong security that can be applied to all traffic crossing the perimeter. Security implemented in the firewall is resistant to bypass. ... IPsec in a firewall is also useful for providing security for traffic from hosts that do not implement IPsec." This supports the concept of gateway-based, transparent security for end devices.
2. Kurose, J. F., & Ross, K. W. (2021). Computer Networking: A Top-Down Approach (8th ed.). Pearson. In Chapter 8, Section 8.7, "Network-Layer Security: IPsec and Virtual Private Networks," the text describes IPsec's tunnel mode, where two routers create a secure tunnel. Hosts behind these routers are unaware of IPsec, and their traffic is secured transparently, aligning with the scenario's requirements.
3. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson. Chapter 20, "IP Security," details IPsec's security policy database (SPD) and how it can be configured on a gateway to selectively encrypt traffic for an entire network, abstracting the security function away from individual hosts like an IoT sensor.
Question 15
Show Answer
A. This is a misconception about network topology and threat actors, not directly about the state of the data itself. Attackers can exist on any network segment.
C. This relates to the value and lifecycle of data (data remanence), not the security of its transmission. Old data can be extremely valuable for reconnaissance.
D. This is a specific example of the broader and more comprehensive misconception described in option B. Many common protocols do not encrypt data by default.
---
1. OWASP Foundation, "OWASP Internet of Things Project - Top 10 2018," I5: Lack of Transport Encryption. The document explicitly states, "Too often, developers do not consider the network over which their data will be transmitted... data is sent without encryption between the IoT device, the cloud, and the mobile application." This highlights the flawed assumption that data is automatically protected. (Source: OWASP IoT Project, 2018, owasp.org/www-project-internet-of-things/).
2. National Institute of Standards and Technology (NIST), "NISTIR 8259A: IoT Device Cybersecurity Capability Core Baseline," December 2020. Section 4.3, "Data Protection," specifies the capability for "Protecting the confidentiality and integrity of data in transit." The inclusion of this as a core capability underscores that it is not an automatic feature and must be deliberately implemented, countering the misconception that data is secure by default. (Page 10, Section 4.3).
3. Al-Sarawi, S., Anbar, M., Alieyan, K., & Alzubaidi, M. (2017). "Internet of Things (IoT) communication protocols: Review." 2017 8th International Conference on Information Technology (ICIT), pp. 685-690. This academic review details various IoT protocols (e.g., MQTT, CoAP) and notes that security is not inherent. For instance, it states, "MQTT does not provide any security feature by itself," and security must be added via TLS. This directly refutes the misconception that protocols automatically encrypt data. (Section III.A, MQTT Protocol). DOI: https://doi.org/10.1109/ICIT.2017.8077928.
Question 16
Show Answer
A. Secure Shell (SSH): SSH is an encrypted protocol. If SSH were being used for the administrative session, eavesdropping would not be possible, even if a network-level tunnel was not active.
C. Telnet: While using the unencrypted Telnet protocol allows eavesdropping, in a properly designed IoT architecture, its use is often restricted to within a secure tunnel (like IPSec). The failure is the misconfiguration of the tunnel that exposes the traffic.
D. Virtual private network (VPN): This is a general term for the technology. IPSec is a specific and common protocol suite used to implement network-layer VPNs, making it a more precise and technically accurate answer.
1. National Institute of Standards and Technology (NIST), NISTIR 8259A, IoT Device Cybersecurity Capability Core Baseline, May 2020. Section 3.2, "Device Security," subsection "3.2.1 Data Protection," states: "The IoT device should use a secure and trusted communication channel for all remote network connections... This may be accomplished by the device itself (e.g., by using TLS) or by a trusted component in the deviceโs immediate network environment (e.g., a network gateway that implements a VPN)." This reference supports the architectural pattern where a VPN (often using IPSec) is the primary security control. Its failure would expose underlying communications.
2. Kent, S., & Seo, K. (2005). RFC 4301: Security Architecture for the Internet Protocol. Internet Engineering Task Force (IETF). Section 1.1, "Benefits of IPsec," states that IPSec can provide confidentiality (encryption) for all traffic at the IP layer. A misconfiguration or disabling of this service would negate this benefit, exposing the data payloads to eavesdropping.
3. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson. Chapter 20, "IP Security," details how IPSec provides security for all traffic between two endpoints (e.g., a gateway and a host). The text explains that IPSec's transport and tunnel modes are designed to prevent attacks like eavesdropping. The scenario in the question describes a failure of this preventative mechanism.
Question 17
Show Answer
A. The administrator's machine: The administrator's machine is used for configuration and management but is not an active participant in the real-time TLS handshake between the endpoint and the server.
C. The Key Distribution Center (KDC): A KDC is a component of other security protocols like Kerberos. It is not a standard entity within the direct client-server SSL/TLS handshake described.
D. The IoT endpoint: While the IoT endpoint (client) generates the pre-master secret in an RSA key exchange, it relies entirely on the server's public key to protect it. The server's role is essential to complete the exchange and establish the trusted session.
---
1. Internet Engineering Task Force (IETF) RFC 5246, The Transport Layer Security (TLS) Protocol Version 1.2.
Section 7.4.2, Server Certificate: "The server MUST send a certificate message whenever the agreed-upon key exchange method uses certificates for authentication." This highlights the server's role in providing its authenticated public key.
Section 7.4.7.1, Client Key Exchange Message (RSA): "The client generates a 48-byte premastersecret... It is then encrypted using the public key from the server's certificate... The server, upon receiving it, will decrypt it with its private key." This passage details the server's critical role in using its private key to enable the shared secret.
2. MIT OpenCourseWare, 6.857 Computer and Network Security, Fall 2017.
Lecture 13 Notes, Transport Layer Security (TLS): The lecture notes describe the TLS handshake, specifying that the server sends its certificate and the client encrypts the pre-master secret with the server's public key. The notes emphasize that the server's possession of the corresponding private key is what secures this exchange, making its role fundamental to the key's establishment. (Available via MIT OCW website).
3. Dierks, T., and Rescorla, E. (2008). The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246.
Section F.1.1.2. RSA Key Exchange and Authentication: This appendix details the handshake for RSA-based cipher suites, explicitly stating the server's role in providing the certificate and the client's role in generating and encrypting the pre-master secret. The entire process hinges on the server's asymmetric key pair.
Question 18
Show Answer
A. External flash access: This is a physical hardware vulnerability related to securing data at rest (data stored on the device), not data in motion.
C. Databases and datastores: This vulnerability concerns the security of data at rest, where information is permanently or temporarily stored, not while it is in transit.
D. Lack of memory space isolation: This is a software vulnerability related to securing data in use (data being processed in RAM), not data being transmitted over a network.
1. OWASP Foundation. (2018). OWASP Internet of Things Top 10 - 2018. The vulnerability is directly addressed in category "I5 Lack of Transport Encryption," which states that a lack of or weak implementation of encryption during transit exposes data to interception. Misconfigured SSL/TLS is a primary example of this.
2. Fagan, M., et al. (2020). NISTIR 8259A: IoT Device Cybersecurity Capability Core Baseline. National Institute of Standards and Technology. Section 4.3, "Data Protection," emphasizes the capability for "protecting the confidentiality and integrity of data in transit" using "cryptographically-sound communication protocols," such as properly configured TLS.
3. Weber, R. H. (2010). Internet of Things โ New security and privacy challenges. Computer Law & Security Review, 26(1), 23-30. https://doi.org/10.1016/j.clsr.2009.11.008. Page 27 discusses communication security, noting that data transmitted between IoT devices and servers must be encrypted to prevent eavesdropping, highlighting the critical role of transport layer security.
Question 19
Show Answer
A. Rivest Cipher 6 (RC6) is a symmetric-key block cipher designed for encryption and is not used for creating digital signatures, which require asymmetric key pairs.
B. Rijndael is the algorithm that became the Advanced Encryption Standard (AES). It is a symmetric-key block cipher used for data encryption, not digital signing.
C. Diffie-Hellman (DH) is a key exchange protocol. Its purpose is to allow two parties to securely establish a shared secret key over an insecure channel, not to sign data.
1. National Institute of Standards and Technology (NIST). (2023). FIPS PUB 186-5: Digital Signature Standard (DSS). Section 6, "Approved Signature Algorithms," explicitly lists RSA as one of the three approved techniques for generating and verifying digital signatures. Available at: https://doi.org/10.6028/NIST.FIPS.186-5
2. Rivest, R., Shamir, A., & Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2), 120โ126. The foundational paper describes how the RSA algorithm can be used for digital signatures (Section V, "Digital Signatures"). Available at: https://doi.org/10.1145/359340.359342
3. Katz, J., & Lindell, Y. (2014). Introduction to Modern Cryptography (2nd ed.). CRC Press. Chapter 12, "Digital Signatures," details the "textbook RSA" signature scheme and its practical implementations. This is a standard textbook in university-level cryptography courses.
4. MIT OpenCourseWare. (2014). 6.857 Network and Computer Security, Lecture 8: Public Key Cryptography II. The lecture notes discuss the application of RSA for digital signatures as a core function of public-key cryptography. Available at: https://ocw.mit.edu/courses/6-857-network-and-computer-security-spring-2014/resources/mit6857s14lecture8/
Question 20
Show Answer
A. Hashing is a cryptographic function used to ensure data integrity (that data has not been altered), not confidentiality or privacy. The question is about privacy.
C. This is incorrect because it ignores the third state of data. Securing data at rest and in motion does not automatically secure it while it is being actively processed.
D. This assumes the universal presence of advanced technologies like secure enclaves (e.g., Intel SGX, AMD SEV). Such confidential computing features are not standard on all IoT hardware.
---
1. Microsoft Azure Documentation, "Confidential computing overview." Microsoft Corporation, 2023. In the section "The problem: Data in use is vulnerable," it states, "Before confidential computing, any data in use was typically unencrypted and vulnerable... For data to be processed, it must be in memory. This leaves data in memory vulnerable to attacks..." This official vendor documentation confirms that data is vulnerable during processing, supporting the correct answer.
2. Intel Corporation, "Intelยฎ Software Guard Extensions (Intelยฎ SGX) For Dummiesยฎ." John Wiley & Sons, Inc., 2021. Chapter 1, "Understanding the Need for Better Security," p. 8. The document explains, "Data is encrypted when itโs at rest... and in transit... But when data is in use, itโs decrypted and in the clear. This state is when data is most vulnerable." This supports the reasoning that data in use is a critical point of vulnerability and refutes the assumption in option D.
3. David, E., & Riley, L. (2021). Computer Security: A Hands-on Approach (3rd ed.). Chapter 12, "Memory Forensics." This university-level textbook details methods, such as memory acquisition and analysis, that can be used to extract sensitive data (like passwords and encryption keys) directly from a system's RAM, demonstrating the tangible risks to data "in use."
Question 21
Show Answer
A. Asymmetric encryption standards: These are computationally intensive and much slower than symmetric standards, making them unsuitable for encrypting large amounts of data. They are typically used for key exchange.
C. Elliptic curve cryptography (ECC): This is a type of asymmetric encryption. While it offers strong security with smaller key sizes, it is still not designed for bulk data encryption due to performance overhead.
D. Diffie-Hellman (DH) algorithm: This is a key exchange protocol, not an encryption algorithm. It is used to securely establish a shared secret key over an insecure channel, which is then used by a symmetric algorithm.
1. National Institute of Standards and Technology (NIST) Special Publication 800-57 Part 1, Revision 5, Recommendation for Key Management.
Section 5.1, "Cryptographic Mechanisms," Page 20: "Symmetric-key algorithms are more efficient (i.e., faster) than asymmetric-key algorithms for protecting data. Therefore, symmetric-key algorithms are typically used to protect data (e.g., for confidentiality or integrity), while asymmetric-key algorithms are used to establish symmetric keys..." This directly supports using symmetric algorithms for bulk data protection.
2. Purdue University, Department of Computer Science, CS 42600, Computer Security.
"Symmetric Key vs. Public Key Cryptography" Lecture Notes: "Symmetric key crypto is much faster (100x to 1000x) than public key crypto. It is used for encrypting large amounts of data." This academic courseware confirms the performance advantage and primary use case for symmetric encryption.
3. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson.
Chapter 2.1, "Symmetric Cipher Model," and Chapter 9.1, "Public-Key Cryptography and RSA": The text consistently explains that symmetric ciphers are used for encrypting large amounts of data (e.g., a file or a database), while public-key (asymmetric) systems are used for key management and digital signatures due to their slow performance.
Question 22
Show Answer
B. ElGamal: This is an asymmetric encryption algorithm. Asymmetric ciphers are too slow for encrypting large amounts of data and are typically used for key exchange or digital signatures.
C. Rivest-Shamir-Adleman (RSA): Like ElGamal, RSA is an asymmetric algorithm. It is not suitable for bulk data encryption due to its high computational overhead and poor performance compared to symmetric ciphers.
D. Secure Hash Algorithm 3-512 (SHA3-512): This is a cryptographic hash function, not an encryption algorithm. Hashing creates a one-way, fixed-size digest of data for integrity verification and cannot be reversed to recover the original data.
1. National Institute of Standards and Technology (NIST). (2020). Special Publication (SP) 800-57 Part 1 Rev. 5: Recommendation for Key Management.
Section 5.2.1, Page 21: States that "Symmetric-key algorithms are more efficient (i.e., faster) than asymmetric-key algorithms for protecting data (e.g., for encryption)." This supports the choice of a symmetric algorithm (3DES) for database encryption.
Section 5.2.2, Page 22: Notes that "Asymmetric-key algorithms are relatively slow and are not used for the encryption of large amounts of data." This directly refutes the use of ElGamal and RSA for this purpose.
2. National Institute of Standards and Technology (NIST). (2015). Federal Information Processing Standards (FIPS) Publication 202: SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions.
Section 1, Page 4: Defines the SHA-3 family as hash functions that produce a "condensed representation of the input message," confirming its purpose is for data integrity, not confidentiality via encryption.
3. Katz, J., & Lindell, Y. (2014). Introduction to Modern Cryptography (2nd ed.). Chapman and Hall/CRC.
Chapter 3, Page 60: Discusses symmetric encryption for applications requiring confidentiality for large amounts of data, contrasting with public-key (asymmetric) encryption, which is less efficient for this task. This academic text reinforces the fundamental principle of using symmetric ciphers for bulk encryption.
Question 23
Show Answer
A. Transport Layer Security (TLS): TLS provides end-to-end encryption but requires that the client application on the IoT endpoint be specifically configured to initiate and manage the secure session.
B. Internet Protocol Security (IPSec): While IPSec is the protocol often used to create VPN tunnels, it is not the complete technology. Furthermore, in its "transport mode," IPSec requires configuration on each endpoint.
D. Elliptic curve cryptography (ECC): ECC is a type of cryptographic algorithm, not a network communication technology. It is a component used by protocols like TLS and IPSec to perform key exchange and create digital signatures.
1. Cisco. (2020). Fundamentals of IoT Security. Cisco Press. In Chapter 5, "Securing the IoT Network," the text discusses the use of VPNs at the network edge. It explains that VPN gateways can be used to create secure tunnels for IoT traffic, stating, "The use of VPNs can provide confidentiality... without requiring the IoT devices themselves to support complex cryptographic protocols." (Paraphrased from concepts in Chapter 5, Section "VPNs for IoT").
2. Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., & Henry, J. (2017). IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things. Cisco Press. Chapter 11, "IoT Security," describes architectural approaches where security is handled by an edge gateway. The gateway terminates the VPN connection, meaning the devices behind it do not need to be VPN-aware.
3. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet of Things Journal, 4(5), 1125-1142. https://doi.org/10.1109/JIOT.2017.2683200. In Section IV-B, "Network Layer Security," the paper discusses how gateways can be used to implement security measures like VPNs on behalf of resource-constrained devices, thereby providing transparent security.
Question 24
Show Answer
A. Salami: This is a financial fraud attack involving the theft of small amounts of money from many sources, targeting assets rather than data confidentiality.
C. Data diddling: This attack involves the unauthorized alteration of data, which is a violation of data integrity, not confidentiality.
D. Denial of Service (DoS): This attack aims to make a system or service unavailable to legitimate users, thus violating availability, not confidentiality.
1. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164. In Section 3.2, "Privacy," the paper discusses how data mining techniques can lead to inference and aggregation attacks in IoT, where "sensitive data about users can be inferred by aggregating information collected from different sources," directly addressing confidentiality breaches. (DOI: https://doi.org/10.1016/j.comnet.2014.11.008)
2. National Institute of Standards and Technology (NIST). (2020). NISTIR 8259A: IoT Device Cybersecurity Capability Core Baseline. Section 2, "How to Use This Document," defines the security objective of Confidentiality as "Preserving authorized restrictions on information access and disclosure." Aggregation and Inference are methods that bypass these restrictions.
3. Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in Computing (5th ed.). Prentice Hall. Chapter 1, "Introduction," defines the core security goals. It classifies Denial of Service (DoS) as an attack on availability (p. 8) and unauthorized data modification, such as Data Diddling, as an attack on integrity (p. 7).
4. Saltzer, J. H., & Schroeder, M. D. (1975). The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9), 1278-1308. This foundational paper defines Confidentiality (controlling who gets to read information), Integrity (controlling unauthorized modification of information), and Availability (ensuring access for authorized parties). DoS and Data Diddling are classic violations of Availability and Integrity, respectively. (DOI: 10.1109/PROC.1975.9939)
Question 25
Show Answer
A. IP address spoofing is a network-layer attack that is not directly enabled or prevented by the use of transport-layer security certificates.
B. DNS hijacking is an independent attack that targets the name resolution process. An unverified certificate does not make DNS records more susceptible to hijacking.
C. Administrative authentication is an application-layer security control (e.g., username/password). It is functionally separate from the TLS/SSL certificate used to secure the communication channel.
1. National Institute of Standards and Technology (NIST). (2019). Special Publication 800-52 Revision 2: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. Section 3.3.1, "Server Authentication," states, "If the client does not authenticate the server, it has no assurance that it is communicating with the correct server. In this case, the client is susceptible to a man-in-the-middle attack."
2. Saltzer, J. H., & Kaashoek, M. F. (2009). Principles of Computer System Design: An Introduction. MIT OCW 6.033 Courseware. Chapter 9, "Security," Section 9.5.2, "Man-in-the-middle attacks," explains how a failure to verify a server's public key via a trusted certificate chain allows an attacker to impersonate the server and intercept communications.
3. Dierks, T., & Rescorla, E. (2008). The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246. Appendix F.1.1, "Man-in-the-Middle," describes how an active attacker can impersonate a server if the client fails to properly verify the server's certificate.
4. Al-Garadi, M. A., Mohamed, A., Al-Ali, A. K., Du, X., & Guizani, M. (2020). A Survey of IoT-Enabled Cyber-Physical Systems: Attacks, Countermeasures, and Open Issues. IEEE Access, 8, 107021-107045. Section IV-A, "Man-in-the-Middle Attack," discusses how MITM attacks in IoT systems often exploit weak authentication mechanisms, including improper certificate validation. (DOI: https://doi.org/10.1109/ACCESS.2020.3000296)
Question 26
Show Answer
A. Triple Data Encryption Standard (3DES): This is a legacy symmetric cipher that is significantly slower than AES and has a smaller 64-bit block size, making it less secure and efficient.
C. Rivest Cipher 4 (RC4): This is a stream cipher with known cryptographic vulnerabilities that make it insecure for modern applications; its use is now widely prohibited.
D. Elliptic curve cryptography (ECC): This is an asymmetric algorithm. Asymmetric cryptography is computationally intensive and too slow for encrypting bulk data; it is typically used for key exchange or digital signatures.
1. National Institute of Standards and Technology (NIST). (2001). FIPS PUB 197: Advanced Encryption Standard (AES). This publication is the official standard for AES, specifying it as the successor to DES for protecting electronic data. The introduction establishes its role for bulk encryption. (Available at: https://doi.org/10.6028/NIST.FIPS.197)
2. National Institute of Standards and Technology (NIST). (2019). SP 800-131A Rev. 2: Transitioning the Use of Cryptographic Algorithms and Key Lengths. Section 4.1, "TDEA (Triple DES)," states that the use of three-key Triple DES for encryption is disallowed after 2023, officially marking it as a deprecated standard. (Page 13)
3. Popov, A. (2015). RFC 7465: Prohibiting RC4 Cipher Suites. Internet Engineering Task Force (IETF). This document details the security flaws in RC4 and formally prohibits its use in all versions of Transport Layer Security (TLS), confirming it is not a secure option. (Section 2)
4. Katz, J., & Lindell, Y. (2014). Introduction to Modern Cryptography (2nd ed.). Chapman and Hall/CRC. Chapter 10 discusses the principles of public-key (asymmetric) cryptography, like ECC, highlighting that it is "orders of magnitude slower than private-key encryption" and thus unsuitable for encrypting large files. (Section 10.1, Page 328)
Question 27
Show Answer
A. Temporal Key Integrity Protocol (TKIP): TKIP is a security protocol for wireless networks. It uses symmetric key cryptography and is now considered deprecated and insecure; it does not use asymmetric key pairs.
C. Advanced Encryption Standard (AES): AES is a symmetric block cipher standard. It uses a single secret key for both the encryption and decryption of data, not a public/private key pair.
D. Triple Data Encryption Standard (3DES): 3DES is a symmetric-key block cipher that applies the DES algorithm three times. Like AES, it uses a single shared key and is not an asymmetric standard.
1. National Institute of Standards and Technology (NIST). (2013). FIPS PUB 186-4: Digital Signature Standard (DSS). This publication specifies algorithms for digital signature applications. Section 6, "Elliptic Curve Digital Signature Algorithm (ECDSA)," details the use of ECC, which is fundamentally based on asymmetric key pairs (private and public keys). Available at: https://doi.org/10.6028/NIST.FIPS.186-4
2. National Institute of Standards and Technology (NIST). (2001). FIPS PUB 197: Advanced Encryption Standard (AES). The abstract and introduction explicitly define AES as a symmetric block cipher that uses the same key for encrypting and decrypting data. Available at: https://doi.org/10.6028/NIST.FIPS.197
3. National Institute of Standards and Technology (NIST). (2017). Special Publication 800-67 Revision 2: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. This document specifies the TDEA (commonly known as 3DES), defining it as a symmetric key block cipher algorithm. Available at: https://doi.org/10.6028/NIST.SP.800-67r2
4. Hite, D. (2017). An Examination of the Security of the Internet of Things. University of Tennessee at Chattanooga, UTC Scholar, Theses and Dissertations. Page 17 discusses ECC as a lightweight public-key cryptography solution ideal for IoT due to its efficiency with smaller key sizes compared to RSA. Available at: https://scholar.utc.edu/theses/488
Question 28
Show Answer
A. Secure Hypertext Transmission Protocol (HTTPS): This protocol encrypts data in transit, specifically for web traffic between a client and a server. It does not protect data stored on a device's disk.
B. Internet Protocol Security (IPSec): This is a protocol suite that secures network communications at the IP layer, typically for creating VPNs. It protects data in transit, not data at rest on a local gateway.
D. Message Digest 5 (MD5): This is a cryptographic hash function, not an encryption algorithm. It creates a unique, fixed-size fingerprint of data for integrity verification but cannot be reversed to recover the original data.
1. National Institute of Standards and Technology (NIST), FIPS PUB 46-3, Data Encryption Standard (DES), October 25, 1999.
Section 1, Specification: "This standard specifies two cryptographic algorithms, the Data Encryption Algorithm (DEA) and the Triple Data Encryption Algorithm (TDEA)... These algorithms may be used to protect sensitive but unclassified computer data." This source confirms that 3DES (TDEA) is an algorithm for encrypting data.
2. National Institute of Standards and Technology (NIST), Special Publication 800-111, Guide to Storage Encryption Technologies for End User Devices, November 2007.
Section 2.1, Full Disk Encryption: "Full disk encryption (FDE)... encrypts all data on a disk... FDE products use standard, public-key cryptographic algorithms such as AES and Triple DES to encrypt the data on the disk." This document explicitly links Triple DES to the encryption of stored data.
3. Internet Engineering Task Force (IETF), RFC 4301, Security Architecture for the Internet Protocol, December 2005.
Section 1.1, About This Document: "This document describes the security architecture for IP, which is designed to provide security services at the IP layer... These services are provided by using two traffic security protocols, the Authentication Header (AH) and the Encapsulating Security Payload (ESP)..." This confirms IPSec's role in securing network traffic (data in transit).
4. Internet Engineering Task Force (IETF), RFC 2818, HTTP Over TLS, May 2000.
Section 1, Introduction: "This memo describes how to use Transport Layer Security (TLS) to secure HTTP connections over the Internet." This defines HTTPS as a mechanism for securing data in transit.
5. Internet Engineering Task Force (IETF), RFC 1321, The MD5 Message-Digest Algorithm, April 1992.
Abstract: "This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit 'fingerprint' or 'message digest' of the input." This establishes MD5 as a hashing algorithm for creating a digest, not for encryption/decryption.
Question 29
Show Answer
B. British Standard 7799 part 3 (BS 7799-3): This is an outdated standard focused on guidelines for information security risk management, not the physical design of a campus to deter general crime.
C. International Organization for Standardization 17799 (ISO 17799): This standard, now ISO/IEC 27002, provides a code of practice for information security controls, not a methodology for general crime prevention through environmental design.
D. National Institute of Standards and Technology Cybersecurity Framework (NIST CSF): This is a voluntary framework consisting of standards, guidelines, and best practices to manage cybersecurity-related risk, not physical security design for a campus.
---
1. CPTED: Crowe, T. D. (2000). Crime Prevention Through Environmental Design: Applications of Architectural Design and Space Management Concepts (2nd ed.). National Crime Prevention Institute. As cited in Cozens, P. M., & Love, T. (2015). A Review and Current Status of Crime Prevention through Environmental Design (CPTED). Journal of Planning Literature, 30(4), 393โ412. (See Section: "The CPTED Concept", pp. 394-395). https://doi.org/10.1177/0885412215595440
2. NIST CSF: National Institute of Standards and Technology. (2018). Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1. U.S. Department of Commerce. (See Section 1.1, "Framework Purpose," p. 1, which states its focus is on reducing cybersecurity risk). https://doi.org/10.6028/NIST.CSWP.04162018
3. ISO 17799 / ISO/IEC 27002: International Organization for Standardization. (2022). ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection โ Information security controls. The scope is defined as providing a reference set of generic information security controls. (See Introduction, Section 0.1 "General").
4. BS 7799-3: The British Standards Institution. (2006). BS 7799-3:2006 Information security management systems. Guidelines for information security risk management. This standard's scope was explicitly limited to information security risk management and served as a basis for the later ISO/IEC 27005 standard.
Question 30
Show Answer
A. Media Access Control (MAC): This is a sublayer of the data link layer. While MAC address filtering can be used for security, it is easily bypassed by spoofing the MAC address of an authorized device.
C. Host Intrusion Detection System (HIDS): A HIDS is installed on an individual device (a host) to monitor its internal activity. It cannot prevent a new, unauthorized device from connecting to the network itself.
D. Network Intrusion Detection System (NIDS): A NIDS is a detective control, not a preventative one. It would alert the administrator that scanning is occurring after the unauthorized device has already connected and started its attack, but it would not prevent the initial access.
---
1. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson.
Section 21.5, "Network Access Control," describes NAC as an approach that "attempts to unify endpoint security technology... user or system authentication, and network security enforcement." It explicitly states that a primary function is to enforce policies and control access at the point a device attempts to join the network.
2. Carnegie Mellon University, Software Engineering Institute (SEI). (2008). Network Access Control: A Glass Half Full.
Paragraph 1: "The primary goal of NAC is to prevent unauthorized and non-compliant systems from accessing the corporate network... NAC solutions enforce policies that a device must meet before it is allowed on the network." This source clearly defines NAC as a preventative measure against unauthorized connections.
3. Cisco. (n.d.). What Is Network Access Control (NAC)?
Overview Section: "Network access control (NAC) is a security solution that helps to enforce security policy compliance on all devices seeking to access network computing resources... When a device is noncompliant, NAC can deny network access..." This official vendor documentation confirms that NAC's role is to prevent non-compliant or unauthorized devices from gaining access.
4. Kim, D., & Solomon, M. G. (2016). Fundamentals of Information Systems Security (3rd ed.). Jones & Bartlett Learning.
Chapter 6, "Network Security," distinguishes between Intrusion Detection Systems (IDS) and preventative controls. It clarifies that an IDS (like NIDS) is a "detective control" that identifies potential intrusions, whereas NAC is presented as a mechanism to "control access to a network." This supports the distinction that NIDS detects while NAC prevents.
Question 31
Show Answer
A. Add tamper detection to the enclosure: While a valid physical security measure, it is primarily a detective control that alerts on a breach, whereas limiting port access is a preventative control that stops the breach from occurring.
C. Allow quick administrator access for mitigation: This is an incident response procedure, not a direct physical security countermeasure implemented on the gateway to prevent or detect an attack.
D. Implement features in software instead of hardware: This is contrary to security best practices. Hardware-based security is generally more robust and resistant to tampering than software-only implementations.
1. NISTIR 8259A, "IoT Device Cybersecurity Capability Core Baseline" (May 2020): In Section 3.2, "Device Security," the document specifies the core baseline capability 3.2.5 Physical Interfaces: "The IoT device should restrict the logical access that authenticated and unauthenticated users and processes have to its physical interfaces (e.g., USB, JTAG, UART)." This directly supports the practice of limiting port access as a key security measure.
2. ENISA (European Union Agency for Cybersecurity), "Good Practices for IoT and Smart Infrastructures Security" (November 2018): In Section 4.2.1, "Physical Security," under the "Device Layer" recommendations, the guide states: "Unused ports should be disabled and protected (e.g. USB ports)." This highlights port protection as a standard good practice for IoT device hardening.
3. OWASP, "IoT Security Verification Standard (ISVS)" (Version 2.1.0, 2023): In section V8, "Hardware Security," requirement ISVS-HS-2 states: "Verify that all external ports and debugging interfaces that are not needed for the device's operation are disabled." This emphasizes disabling ports as a verifiable security requirement for IoT hardware.
Question 32
Show Answer
A. Secure Hypertext Transfer Protocol (HTTPS) encrypts data in transit but does not inspect the protocol for malformations; the fuzzed data is still delivered to the server.
B. Public Key Infrastructure (PKI) is a framework for managing digital certificates to establish trust and enable encryption; it does not analyze network packet structure.
D. Hash-based Message Authentication Code (HMAC) ensures message integrity and authenticity but does not prevent an authenticated source from sending a correctly signed but malformed message.
---
1. On NGFW Capabilities:
Stewart, J. M., Chapple, M., & Gibson, D. (2021). CISSP Certified Information Systems Security Professional Official Study Guide (9th ed.). Sybex. In Chapter 21, "Managing Security Operations," the text describes Next-Generation Firewalls (NGFWs) as application-aware devices that can perform deep packet inspection to identify and block malicious traffic, including protocol anomalies, which is the basis of a fuzzing attack. (Note: While a certification guide, CISSP materials are widely recognized as authoritative in academic and professional security contexts).
2. On Deep Packet Inspection and Protocol Analysis:
Stallings, W., & Brown, L. (2018). Computer Security: Principles and Practice (4th ed.). Pearson. In Chapter 21, "Firewalls and Intrusion Prevention Systems," the role of an IPS (a core component of an NGFW) is detailed. Section 21.2 explains that an IPS can use "protocol anomaly" detection to identify "unexpected packet header values" and "application protocol anomaly" detection to find non-standard application traffic, which directly addresses the nature of protocol fuzzing.
3. On Fuzzing as an Attack Vector:
Sutton, M., Greene, A., & Amini, P. (2007). Fuzzing: Brute Force Vulnerability Discovery. Addison-Wesley Professional. Chapter 1, "The Philosophy of Fuzzing," defines fuzzing as a method of identifying implementation bugs using malformed or semi-malformed data injection. This highlights that the attack relies on malformed data, which security devices like NGFWs are designed to detect via protocol validation.
Question 33
Show Answer
A. Role-Based Access Control (RBAC) is an authorization model that grants permissions based on user roles; it does not handle the authentication process or credential storage location.
B. Password Authentication Protocol (PAP) is an insecure authentication method that transmits passwords in cleartext. It is a protocol, not a system for centralized, off-device credential storage.
D. Border Gateway Protocol (BGP) is a core routing protocol of the internet used to exchange routing information between autonomous systems. It is unrelated to user authentication.
1. Rigney, C., Willens, S., Rubens, A., & Simpson, W. (2000). RFC 2865: Remote Authentication Dial In User Service (RADIUS). The Internet Engineering Task Force (IETF). Section 1, "Introduction," states, "The server is responsible for receiving user connection requests, authenticating the user...". This establishes the centralized, off-device authentication model. Available at: https://doi.org/10.17487/RFC2865
2. Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.). Pearson. Chapter 8.7, "Securing Wireless LANs," describes the use of an authentication server (AS) in 802.1X, which is typically a RADIUS server, to authenticate users without storing credentials on the access point itself.
3. Cisco. (2017). RADIUS Protocol Overview. Cisco Systems, Inc. The document states, "RADIUS is a distributed client/server system that secures networks against unauthorized access... RADIUS clients run on Cisco routers and send authentication requests to a central RADIUS server that contains all user authentication and network service access information." (Document ID: 12433).
Question 34
Show Answer
A. Directory harvesting: This is an information-gathering technique to find valid resource names. While possible with shell access, it is a far less severe risk than complete system compromise via malware.
B. Rainbow table attacks: These attacks are used to crack password hashes. The scenario specifies "unprotected" access, meaning no authentication is required, rendering this attack method irrelevant for gaining initial access.
D. Buffer overflow: This is a type of software vulnerability that could be used to gain shell access. It is a cause, not a direct risk or consequence of already having unprotected access.
1. Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., & Ghani, N. (2019). A Survey on IoT Security: Challenges, Approaches, and New Trends. IEEE Access, 7, 14307-14326. DOI: https://doi.org/10.1109/ACCESS.2019.2915748.
In Section IV-A, "Physical Layer Attacks," the paper states: "Attackers can also get a root shell on the device through the UART interface. With root access, attackers can do anything they want, such as installing malicious software or stealing sensitive information." This directly links unprotected shell access via physical ports to the risk of malware installation.
2. OWASP Foundation. (2018). OWASP Internet of Things Top 10 - 2018. OWASP.
Reference vulnerability "I8:2018-Insecure Default Settings" discusses how devices may ship with insecure settings, such as open debugging ports that provide shell access. The document notes that the impact of exploitation is "a full compromise of the device," which is typically achieved by installing malicious code to maintain control and carry out further attacks.
Question 35
Show Answer
A. This is a logical access control measure and does not protect against an attacker physically tampering with the hardware itself.
C. A firewall is a network security control that filters traffic; it offers no protection against an attacker with direct physical access to the device.
D. Allowing easy access to components would significantly increase the risk of physical attacks, making it easier to tamper with or reverse-engineer the hardware.
1. OWASP Foundation, OWASP Internet of Things Top 10 2018, I10: Lack of Physical Hardening. The document states, "Lack of physical hardening allows potential attackers to gain sensitive information that can help them to perform a remote attack or to take local control of the device... Attackers can gain access to the system by connecting to exposed ports (e.g., UART, JTAG)." It recommends disabling or removing these ports in production devices.
2. Chantzis, F., St-Hilaire, M., & Rogers, S. (2017). A Practical Guide to Hacking the Internet of Things. Johns Hopkins University Information Security Institute. Section 3.1, "Hardware Hacking," details how attackers use debug ports like JTAG and UART for reverse engineering and gaining access. The report implicitly supports the removal of such ports as a security measure by demonstrating the high risk they pose.
3. NISTIR 8259A, IoT Device Cybersecurity Capability Core Baseline. (May 2020). Section 3.3, "Device Security," emphasizes the need to protect device interfaces. While focused on logical interfaces, the principle of restricting access is paramount. The document states, "The IoT device should restrict logical access to its local and network interfaces to only authorized entities." Removing physical interfaces is the ultimate restriction for unauthorized physical entities.