Free Practice Test

CertNexus ITS 110 Free Practice Test

Study Smarter for the CertNexus ITS 110 Exam with Our Free and Reliable ITS 110 Exam Questions โ€“ Updated for 2025.

At Cert Empire, we are focused on delivering the most accurate and up-to-date exam questions for students preparing for the CertNexus ITS 110 Exam. To make preparation easier, weโ€™ve made parts of our Agentforce Specialist exam resources free for everyone. You can practice as much as you like with CertNexus ITS 110.

Question 1

Which of the following attacks utilizes Media Access Control (MAC) address spoofing?
Options
A: Network Address Translation (NAT)
B: Man-in-the-middle (MITM)
C: Network device fuzzing
D: Unsecured network ports
Show Answer
Correct Answer:
Man-in-the-middle (MITM)
Explanation
A Man-in-the-middle (MITM) attack is a method where an attacker secretly intercepts and potentially alters the communications between two parties who believe they are directly communicating with each other. On a Local Area Network (LAN), a common technique to execute a MITM attack is ARP (Address Resolution Protocol) poisoning. In this scenario, the attacker sends forged ARP messages to associate their own Media Access Control (MAC) address with the IP address of a legitimate network device, such as the default gateway. This act of impersonating another device's MAC address is known as MAC spoofing. As a result, network traffic is redirected through the attacker's machine, allowing them to capture, inspect, or modify the data.
Why Incorrect Options are Wrong

A. Network Address Translation (NAT) is a standard networking method for remapping IP addresses and is not an attack that involves MAC spoofing.

C. Network device fuzzing is a software testing technique that involves sending malformed data to a device to discover vulnerabilities, not impersonating a device via its MAC address.

D. Unsecured network ports represent a physical layer vulnerability, not a specific attack technique that inherently utilizes MAC spoofing.

References

1. National Institute of Standards and Technology (NIST). (2008). Technical Guide to Information Security Testing and Assessment (NIST Special Publication 800-115). Section 4.3.2, "Network Sniffing," describes how ARP spoofing is used to redirect traffic for sniffing, a fundamental component of MITM attacks. The document states, "ARP spoofing involves constructing a large number of forged ARP request and reply packets to overload network switches." This forgery relies on manipulating MAC-to-IP mappings.

2. Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.). Pearson. Chapter 8, "Security in Computer Networks," discusses MITM attacks and ARP poisoning, explaining that an attacker can send ARP messages with a spoofed source MAC address to poison the ARP caches of other hosts on the subnet, thereby redirecting traffic. (Specific discussion on ARP poisoning as a MITM vector).

3. Al-Shaer, E., & El-Atawy, A. (2009). Network Security: A Top-Down Approach. In Proceedings of the 14th ACM symposium on Access control models and technologies (pp. 143-152). ACM. The paper discusses various network attacks, explicitly linking ARP poisoning (which uses MAC spoofing) as a primary method for launching Man-in-the-Middle attacks on a switched Ethernet LAN. (DOI: https://doi.org/10.1145/1542207.1542230)

Question 2

In order to successfully perform a man-in-the-middle (MITM) attack against a secure website, which of the following could be true?
Options
A: Client to server traffic must use Hypertext Transmission Protocol (HTTP)
B: The server must be vulnerable to malformed Uniform Resource Locator (URL) injection
C: The server must be using a deprecated version of Transport Layer Security (TLS)
D: The web server's X.509 certificate must be compromised
Show Answer
Correct Answer:
The server must be using a deprecated version of Transport Layer Security (TLS)
Explanation
A Man-in-the-Middle (MITM) attack against a website secured with Transport Layer Security (TLS) aims to intercept and decrypt the communication channel. This can be achieved if the server is configured to use a deprecated version of TLS (e.g., TLS 1.0, 1.1) or its predecessor, SSL. These older protocol versions contain known cryptographic vulnerabilities (such as POODLE, BEAST, and others) that an attacker can exploit. By forcing or intercepting a connection that uses these weak protocols, an attacker positioned between the client and server can break the encryption, thereby compromising the confidentiality and integrity of the data stream.
Why Incorrect Options are Wrong

A. A secure website uses HTTPS, which is encrypted. An MITM attack on unencrypted HTTP is trivial but does not apply to a site that is already considered secure.

B. URL injection is an application-layer vulnerability. It does not directly enable the cryptographic compromise of the TLS-encrypted network channel required for this type of MITM attack.

D. While a compromised certificate also enables an MITM attack, it is a failure of server identity authentication, not a flaw within the encryption protocol itself, which is what deprecated TLS represents.

References

1. National Institute of Standards and Technology (NIST). (2019). Special Publication (SP) 800-52r2: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. Section 3.1, "TLS Protocol Versions," explicitly states that TLS versions 1.1 and 1.0 are deprecated and must not be used due to security vulnerabilities.

2. Internet Engineering Task Force (IETF). (2015). RFC 7525: Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). Section 3.1.1 discusses the POODLE attack, a well-known MITM attack that exploits a vulnerability in the deprecated SSL 3.0 protocol.

3. Massachusetts Institute of Technology (MIT) OpenCourseWare. (2014). 6.858 Computer Systems Security, Lecture 15: Web Security. The lecture notes detail specific MITM attacks like BEAST and POODLE, which directly exploit weaknesses in older versions of TLS (1.0) and SSL, respectively. (Available at MIT OCW website).

Question 3

An IoT security administrator wishes to mitigate the risk of falling victim to Distributed Denial of Service (DDoS) attacks. Which of the following mitigation strategies should the security administrator implement? (Choose two.)
Options
A: Block all inbound packets with an internal source IP address
B: Block all inbound packets originating from service ports
C: Enable unused Transmission Control Protocol (TCP) service ports in order to create a honeypot
D: Block the use of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) through his perimeter firewall
E: Require the use of X.509 digital certificates for all incoming requests
Show Answer
Correct Answer:
Block all inbound packets with an internal source IP address, Require the use of X.509 digital certificates for all incoming requests
Explanation
A comprehensive Distributed Denial of Service (DDoS) mitigation strategy requires a defense-in-depth approach, addressing threats at multiple network layers. Option A, blocking inbound packets with an internal source IP address (ingress filtering), is a fundamental network-layer control. It prevents attackers from using spoofed internal IP addresses, a technique common in reflection and amplification attacks. Option E, requiring X.509 certificates for all incoming requests, is an application-layer control. It forces clients to authenticate themselves, which can mitigate DDoS attacks aimed at exhausting server resources by initiating a high volume of unauthenticated sessions (e.g., TLS handshake floods). Together, these two strategies provide robust protection against different DDoS attack vectors targeting an IoT system.
Why Incorrect Options are Wrong

B. Blocking inbound packets from all service ports is overly broad and could disrupt legitimate traffic, as some services communicate using low-numbered source ports.

C. A honeypot is a system designed to attract and study attackers for threat intelligence purposes; it is not a direct mitigation or blocking mechanism.

D. Blocking all TCP and UDP traffic would cause a complete service outage, which is the goal of a DoS attack, not a method of mitigation.

References

1. Ferguson, P., & Senie, D. (2000). Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827. IETF. Section 1. This document explicitly states that ingress filtering "prohibits DoS attacks that use forged IP source addresses to be launched from 'behind' an Internet Service Provider's (ISP's) aggregation point."

2. Souppaya, M., & Scarfone, K. (2013). Guide to Security for Full Virtualization Technologies. NIST Special Publication 800-128. National Institute of Standards and Technology. Section 5.5.2, "Network Segmentation and Segregation," recommends ingress filtering "to protect the organization from certain DoS attacks."

3. Mahjabin, T., Xiao, Y., Sun, G., & Jiang, W. (2017). A survey of distributed denial-of-service attack, prevention, and mitigation techniques. International Journal of Distributed Sensor Networks, 13(12). https://doi.org/10.1177/1550147717741463. The section "Application Layer DDoS Attack Prevention and Mitigation" discusses the use of authentication and cryptographic puzzles to differentiate legitimate users from attackers, which aligns with the principle of requiring client-side X.509 certificates.

Question 4

An IoT security administrator is concerned about an external attacker using the internal device management local area network (LAN) to compromise his IoT devices. Which of the following countermeasures should the security administrator implement? (Choose three.)

Options
A:

A. Require the use of Password Authentication Protocol (PAP)

B:

B. Create a separate management virtual LAN (VLAN)

C:

C. Ensure that all IoT management servers are running antivirus software

D:

D. Implement 802.1X for authentication

E:

E. Ensure that the Time To Live (TTL) flag for outgoing packets is set to 1

F:

F. Only allow outbound traffic from the management LAN

G:

G. Ensure that all administrators access the management server at specific times

Show Answer
Correct Answer:
B. Create a separate management virtual LAN (VLAN), D. Implement 802.1X for authentication, E. Ensure that the Time To Live (TTL) flag for outgoing packets is set to 1
Explanation
To protect an internal IoT device management LAN from external attackers, the most effective strategy involves network isolation, stringent access control, and traffic containment. Creating a separate management VLAN (B) segments and isolates critical management traffic from other network segments, preventing lateral movement by an attacker. Implementing 802.1X (D) provides port-based Network Access Control (NAC), ensuring that only authenticated and authorized devices can connect to this sensitive LAN. Setting the Time To Live (TTL) flag to 1 (E) for packets originating from the management network prevents them from being routed beyond the local subnet. This effectively contains the traffic, making it non-routable and inaccessible from any external network, directly thwarting an external attacker.
Why Incorrect Options are Wrong

A. Requiring the use of Password Authentication Protocol (PAP) is insecure as it transmits passwords in cleartext, which would increase the risk of compromise, not mitigate it.

C. While antivirus on servers is a good security practice, it is a host-based control and does not prevent an attacker from gaining access to the management network itself.

F. Only allowing outbound traffic is an incomplete firewall strategy; it does not prevent an attacker already on an adjacent internal network from initiating inbound connections to the management LAN.

G. Restricting access to specific times is a weak administrative control that can be bypassed if an attacker compromises credentials; it does not secure the network layer.

References

1. VLANs for Segmentation (B): National Institute of Standards and Technology (NIST), Special Publication 800-207, "Zero Trust Architecture," Section 3.2.1, discusses micro-segmentation using VLANs to isolate network resources and prevent lateral movement. It states, "This can be accomplished via gateways and/or network segmentation. These gateways can be implemented as virtual or physical devices... VLANs can also be used to segment a network."

2. 802.1X for Authentication (D): Carnegie Mellon University, Software Engineering Institute, "Limiting Network Access with 802.1X," emphasizes its role in security: "IEEE 802.1X is a standard for port-based network access control (PNAC). It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN." This prevents unauthorized devices from connecting to the secured management network.

3. TTL for Containment (E): Internet Engineering Task Force (IETF), RFC 5082, "The Generalized TTL Security Mechanism (GTSM)," Section 1, describes using TTL to protect against remote attacks. "The Generalized TTL Security Mechanism (GTSM) is a mechanism to protect a protocol from CPU-utilization-based attacks... by checking whether the TTL of a received packet has an expected value. The check is based on the fact that most attacks from outside the network will have a lower TTL..." Setting TTL to 1 ensures packets are confined to the local segment.

Question 5

Which of the following attacks is a reflected Distributed Denial of Service (DDoS) attack?
Options
A: Teardrop
B: Ping of Death
C: SYN flood
D: Smurf
Show Answer
Correct Answer:
Smurf
Explanation
A Smurf attack is a classic example of a reflected and amplified Distributed Denial of Service (DDoS) attack. The attacker sends a large number of ICMP Echo Request packets (pings) to a network's broadcast address. Crucially, the source IP address of these packets is spoofed to be the IP address of the intended victim. All the active hosts on the broadcast network then respond with an ICMP Echo Reply to the victim's IP address. This "reflects" the traffic off the intermediary network and amplifies the volume of traffic directed at the victim, overwhelming its resources.
Why Incorrect Options are Wrong

A. Teardrop is a fragmentation attack that sends malformed, overlapping IP fragments to crash the target's operating system during reassembly; it is not a reflected attack.

B. Ping of Death is a legacy DoS attack that sends an oversized ICMP packet, causing a buffer overflow and system crash; it is not a reflected attack.

C. A SYN flood is a resource exhaustion attack that exploits the TCP three-way handshake by sending a high volume of SYN packets, but it does not use intermediary reflectors.

References

1. Kaur, J., & Singh, K. (2016). A study of DoS and DDoS attacks. In 2016 International Conference on Computing, Communication and Automation (ICCCA) (pp. 1360-1365). IEEE. DOI: 10.1109/CCAA.2016.7813969. (This paper categorizes the Smurf attack under "Reflected Attacks" in Table 1, while SYN Flood is categorized under "Protocol Exploits".)

2. CERT Coordination Center. (1998, January 5). CERTยฎ Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks. Carnegie Mellon University. Retrieved from https://resources.sei.cmu.edu/assetfiles/certadvisory/1998001.pdf. (Section "II. Description" explains the mechanism: "The source address of the packet is forged to be the intended victim... The result is that the victim is flooded with echo reply packets.")

3. Kurose, J. F., & Ross, K. W. (2021). Computer Networking: A Top-Down Approach (8th ed.). Pearson. (In Section 1.5.2, "Denial-of-Service (DoS) Attacks," the text describes how attackers can spoof their source address and explains amplification attacks like the Smurf attack, which reflects traffic off multiple hosts.)

Question 6

An IoT security architect wants to implement Bluetooth between two nodes. The Elliptic Curve Diffie- Hellman (ECDH) cipher suite has been identified as a requirement. Which of the following Bluetooth versions can meet this requirement?
Options
A: Bluetooth Low Energy (BLE) v4.0
B: BLE v4.2
C: BLE v4.1
D: Any of the BLE versions
Show Answer
Correct Answer:
BLE v4.2
Explanation
The requirement for the Elliptic Curve Diffie-Hellman (ECDH) cipher suite is met by the LE Secure Connections pairing feature. This feature was introduced specifically in the Bluetooth Core Specification version 4.2. LE Secure Connections uses the FIPS-approved ECDH key exchange protocol to provide robust security against passive eavesdropping and man-in-the-middle (MITM) attacks. Bluetooth versions prior to 4.2, such as 4.0 and 4.1, use a method called LE Legacy Pairing, which does not utilize ECDH and is known to be vulnerable. Therefore, only BLE v4.2 and later versions can satisfy the requirement.
Why Incorrect Options are Wrong

A. Bluetooth Low Energy (BLE) v4.0: This version uses LE Legacy Pairing, which does not support the ECDH cipher suite for key exchange.

C. BLE v4.1: This version also relies on the older LE Legacy Pairing method and lacks the required ECDH support.

D. Any of the BLE versions: This is incorrect because support for ECDH was a specific enhancement introduced in version 4.2, not a feature of earlier versions.

References

1. Bluetooth Special Interest Group (SIG). Bluetooth Core Specification Version 4.2. Vol. 3, Part H, Section 2.1 "Pairing Methods". This section officially introduces LE Secure Connections, contrasting it with LE legacy pairing. Section 2.3.5.6 "LE Secure Connections pairing phase 2" explicitly details the ECDH public key exchange process.

2. National Institute of Standards and Technology (NIST). NIST Special Publication 800-121 Revision 2: Guide to Bluetooth Security. (May 2017). Section 4.3.2, "LE Secure Connections Pairing," states, "LE Secure Connections pairing was introduced in Bluetooth v4.2... LE Secure Connections pairing uses Elliptic Curve Diffie-Hellman (ECDH) public key cryptography for key generation..."

3. Padgette, J., Bahr, J., Batra, M., Holtmann, M., Smith, R., Chen, L., & Scarfone, K. (2016). A Survey of Bluetooth Low Energy Security. This academic survey, often cited in security research, notes on page 4: "Bluetooth 4.2 introduced a new pairing procedure called LE Secure Connections... LE Secure Connections uses Elliptic Curve Diffie-Hellman (ECDH) key exchange..." (Available via arXiv:1602.02929).

Question 7

An IoT security administrator realizes that when he attempts to visit the administrative website for his devices, he is sent to a fake website. To which of the following attacks has he likely fallen victim?
Options
A: Buffer overflow
B: Denial of Service (DoS)
C: Birthday attack
D: Domain name system (DNS) poisoning
Show Answer
Correct Answer:
Domain name system (DNS) poisoning
Explanation
The scenario describes a classic case of Domain Name System (DNS) poisoning, also known as DNS spoofing. In this attack, a malicious actor corrupts the data in a DNS server's cache, causing it to return an incorrect IP address for a legitimate domain name. When the administrator attempts to navigate to the administrative website, their system queries the compromised DNS server, which then resolves the domain to the IP address of the fake website. This effectively redirects the user's traffic to the attacker-controlled site without their knowledge, matching the described outcome perfectly.
Why Incorrect Options are Wrong

A. Buffer overflow: This is a memory-based vulnerability exploitation technique used to execute arbitrary code or crash a system, not to redirect network traffic via domain names.

B. Denial of Service (DoS): This type of attack aims to make a network resource or website unavailable to its intended users, typically by flooding it with traffic, rather than redirecting users to a different site.

C. Birthday attack: This is a cryptographic attack that exploits probability theory to find collisions in hash functions, primarily used for forging digital signatures, and is unrelated to website redirection.

References

1. Stallings, W., & Brown, L. (2018). Computer Security: Principles and Practice (4th ed.). Pearson. In Chapter 21.5, "DNS Attacks," the text describes DNS poisoning as an attack where "an attacker is able to intercept a DNS request and reply with a forged DNS response... The forged response redirects the user to a different Web site."

2. Kuhrer, M., Hupperich, T., Holz, T., & Rossow, C. (2014). Going Wild: Large-Scale Classification of Open DNS Resolvers. In Proceedings of the 2014 Conference on Internet Measurement Conference (IMC '14). Association for Computing Machinery, New York, NY, USA, 233โ€“246. The paper discusses DNS vulnerabilities, stating, "An attacker can poison the cache of a DNS resolver to redirect clients to a malicious server" (Section 2.1, DNS Cache Poisoning). DOI: https://doi.org/10.1145/2663716.2663733

3. MIT OpenCourseWare. (2014). 6.858 Computer Systems Security, Lecture 15: Network Security. Massachusetts Institute of Technology. The lecture notes explain DNS spoofing: "Goal: get victim to talk to a malicious server, by sending a fake DNS reply with a bad IP address." (Section 3, DNS Spoofing).

4. National Institute of Standards and Technology (NIST). (2010). NIST Special Publication 800-81-2: Secure Domain Name System (DNS) Deployment Guide. Section 2.2, "DNS Vulnerabilities," details how cache poisoning allows an attacker to "redirect unsuspecting users to a malicious Web site."

Question 8

Network filters based on Ethernet burned-in-addresses are vulnerable to which of the following attacks?
Options
A: Media Access Control (MAC) spoofing
B: Buffer overflow
C: Packet injection
D: GPS spoofing
Show Answer
Correct Answer:
Media Access Control (MAC) spoofing
Explanation
Network filters that rely on Ethernet burned-in addresses, more commonly known as Media Access Control (MAC) addresses, operate by maintaining an access control list of approved hardware addresses. The fundamental vulnerability of this security measure is that MAC addresses can be easily altered in software. An attacker can monitor network traffic to discover the MAC address of an authorized device and then reconfigure their own network interface to use, or "spoof," that address. This allows the attacker's device to impersonate the legitimate one, thereby bypassing the filter entirely.
Why Incorrect Options are Wrong

B. Buffer overflow: This is a software vulnerability where a process overwrites memory boundaries. It is unrelated to bypassing network layer 2 hardware address filters.

C. Packet injection: While an attacker might inject packets after spoofing a MAC address, packet injection itself is a broader attack and not the specific vulnerability of the MAC filter.

D. GPS spoofing: This attack involves broadcasting false GPS signals to deceive location-aware devices. It has no relevance to MAC address-based network access control.

References

1. National Institute of Standards and Technology (NIST). (2012). Guidelines for Securing Wireless Local Area Networks (WLANs) (NIST Special Publication 800-153). Section 4.2.1, "MAC Address Filtering," states, "However, because MAC addresses are sent in the clear, an attacker can easily spoof the MAC address of an authorized client."

2. Kurose, J. F., & Ross, K. W. (2021). Computer Networking: A Top-Down Approach (8th ed.). Pearson. In Chapter 8.3, "Securing Wireless LANs," the text explains that MAC filtering is a weak security measure because "the intruder can learn the MAC addresses of stations that are associated with the AP... and then have his or her station pretend to be one of these stations by spoofing its MAC address."

3. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson. Chapter 17, "Wireless Network Security," discusses the security flaws of early Wi-Fi standards, noting that MAC address filtering is easily defeated by sniffing a valid MAC address and then spoofing it.

Question 9

An IoT security architect needs to minimize the security risk of a radio frequency (RF) mesh application. Which of the following might the architect consider as part of the design?
Options
A: Make pairing between nodes very easy so that troubleshooting is reduced.
B: Encrypt data transmission between nodes at the physical/logical layers.
C: Prevent nodes from being rejected to keep the value of the network as high as possible.
D: Allow implicit trust of all gateways since they are the link to the internet.
Show Answer
Correct Answer:
Encrypt data transmission between nodes at the physical/logical layers.
Explanation
Encrypting data transmission between nodes in a radio frequency (RF) mesh network is a fundamental security measure. This control protects the confidentiality and integrity of data in transit, preventing unauthorized parties from eavesdropping on or altering the communication. Wireless transmissions are inherently broadcast and susceptible to interception. Implementing encryption at the lower layers (e.g., the MAC sublayer as defined in IEEE 802.15.4) ensures that all data exchanged between nodes is secured at a foundational level, directly minimizing the risk of data exposure and tampering within the mesh fabric.
Why Incorrect Options are Wrong

A. Making pairing "very easy" often bypasses essential authentication steps, which increases the risk of unauthorized nodes joining the network.

C. A secure network must have a mechanism to reject or evict untrusted or compromised nodes to maintain its integrity and security.

D. Implicitly trusting any network component, especially a critical gateway, is a major security flaw that violates the principle of zero trust.

References

1. National Institute of Standards and Technology (NIST). (2020). IoT Device Cybersecurity Capability Core Baseline (NISTIR 8259A). Section 3.3, Data Protection, states, "The IoT device should have the capability to protect the data it stores and transmits from unauthorized access and modification." This supports the need for encryption for data in transit.

2. IEEE Computer Society. (2020). IEEE Standard for Low-Rate Wireless Networks (IEEE Std 802.15.4-2020). Section 9, "MAC security," specifies the security services for the protocol, including access control, data confidentiality (encryption), and data authenticity. This standard is a foundation for many IoT mesh protocols like Zigbee and Thread.

3. Al-Saidi, R., Al-Khasawneh, M. A., & Al-Bataineh, O. M. (2021). A Comprehensive Review on the Security of IoT Wireless Protocols. In Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2021) (pp. 685-697). Springer, Cham. Section 3.1 discusses IEEE 802.15.4 security, noting that its MAC layer security "provides confidentiality and integrity protection for transmitted data frames using AES-CCM." DOI: https://doi.org/10.1007/978-3-030-76346-663

Question 10

Which of the following methods is an IoT portal administrator most likely to use in order to mitigate Distributed Denial of Service (DDoS) attacks?
Options
A: Implement Domain Name System Security Extensions (DNSSEC) on all Internet-facing name servers
B: Disable Network Address Translation Traversal (NAT-T) at the border firewall
C: Implement traffic scrubbers on the upstream Internet Service Provider (ISP) connection
D: Require Internet Protocol Security (IPSec) for all inbound portal connections
Show Answer
Correct Answer:
Implement traffic scrubbers on the upstream Internet Service Provider (ISP) connection
Explanation
Traffic scrubbing is a primary and highly effective method for mitigating Distributed Denial of Service (DDoS) attacks. This technique diverts all incoming traffic, including the malicious attack traffic, to a specialized third-party "scrubbing center" or an upstream Internet Service Provider (ISP) facility. At this location, the traffic is analyzed, and malicious packets are identified and dropped ("scrubbed"). Only the clean, legitimate traffic is then forwarded to the IoT portal's servers. This prevents the organization's own network perimeter and internet connection from being saturated and overwhelmed by the sheer volume of a DDoS attack, ensuring service availability for legitimate users.
Why Incorrect Options are Wrong

A. DNSSEC authenticates DNS responses to prevent spoofing and cache poisoning; it does not mitigate volumetric traffic floods characteristic of DDoS attacks.

B. Disabling NAT-T impacts the functionality of IPsec VPNs traversing NAT devices and is not a mechanism for mitigating DDoS attacks.

D. IPSec is used to encrypt and authenticate data packets between two endpoints but does not prevent a volumetric attack from overwhelming a server's resources.

References

1. National Institute of Standards and Technology (NIST). (2012). Special Publication 800-61 Rev. 2, Computer Security Incident Handling Guide. Section 3.4.4, "Denial of Service," states that for large-scale attacks, an organization may need assistance from its ISP, which aligns with the principle of upstream traffic scrubbing. Available at: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf

2. Carnegie Mellon University. (2021). 18-730: Introduction to Computer Security, Lecture 15: Network Security & Denial of Service. Course materials discuss DDoS mitigation strategies, highlighting the necessity of upstream filtering (scrubbing) by ISPs or specialized services to handle attacks that exceed the victim's bandwidth.

3. Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39โ€“53. This foundational academic paper categorizes defense mechanisms by their deployment location, identifying filtering at the "intermediate network" (i.e., within the ISP cloud) as a key strategy, which is the principle behind traffic scrubbing. DOI: https://doi.org/10.1145/997150.997156

Question 11

A DevOps engineer wants to provide secure network services to an IoT/cloud solution. Which of the following countermeasures should be implemented to mitigate network attacks that can render a network useless?
Options
A: Network firewall
B: Denial of Service (DoS)/Distributed Denial of Service (DDoS) mitigation
C: Web application firewall (WAF)
D: Deep Packet Inspection (DPI)
Show Answer
Correct Answer:
Denial of Service (DoS)/Distributed Denial of Service (DDoS) mitigation
Explanation
The question asks for a countermeasure against network attacks that can "render a network useless." This phrase directly describes the goal of a Denial of Service (DoS) or Distributed Denial of Service (DDoS) attack. These attacks overwhelm a network's resources, such as bandwidth or server capacity, with malicious traffic, making it unavailable to legitimate users. Therefore, implementing specific DoS/DDoS mitigation techniques, which are designed to detect and filter this malicious traffic, is the most direct and effective countermeasure to prevent the network from being rendered useless.
Why Incorrect Options are Wrong

A. Network firewall: A standard firewall primarily provides access control based on rules. It can be overwhelmed by the sheer volume of traffic in a modern DDoS attack and is not its primary countermeasure.

C. Web application firewall (WAF): A WAF operates at the application layer (Layer 7) to protect against attacks like SQL injection. It does not protect the network infrastructure from volumetric attacks that cause outages.

D. Deep Packet Inspection (DPI): DPI is a technology for examining packet content, not a complete mitigation strategy itself. While it can be a component of a DDoS solution, it is not the overarching countermeasure.

References

1. University Courseware: Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.). Pearson. In Chapter 1.6, "Network Security," the text describes Denial-of-Service (DoS) attacks as assaults that "render a network, host, or other piece of infrastructure unusable by legitimate users" by flooding the resource with bogus traffic. This aligns directly with the question's scenario.

2. Vendor Documentation: Microsoft Azure. (2023). Overview of Azure DDoS Protection. Microsoft Docs. In the "About Azure DDoS Protection" section, the service is described as defending against "volumetric attacks" and "protocol attacks" that "attempt to make a resource unavailable to legitimate users." This is the specific countermeasure for the threat described.

3. Peer-Reviewed Academic Publication: Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., & Ghani, N. (2019). Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and Defense Mechanisms. IEEE Communications Surveys & Tutorials, 21(2), 1641-1681. In Section IV-A, "Denial of Service (DoS)," the authors state, "The goal of a DoS attack is to make a network resource unavailable to its intended users... In the context of IoT, DoS attacks can render entire networks of devices inoperable." DOI: https://doi.org/10.1109/COMST.2018.2883222

Question 12

What is one popular network protocol that is usually enabled by default on home routers that creates a large attack surface?
Options
A: Open virtual private network (VPN)
B: Universal Plug and Play (UPnP)
C: Network Address Translation (NAT)
D: Domain Name System Security Extensions (DNSSEC)
Show Answer
Correct Answer:
Universal Plug and Play (UPnP)
Explanation
Universal Plug and Play (UPnP) is a network protocol designed to allow devices on a local network to discover each other and automatically configure port forwarding on the router. While convenient, it is notoriously insecure and is often enabled by default on consumer-grade routers. This automatic port-opening capability can be exploited by malware inside the network to expose internal services to the internet. Furthermore, flawed UPnP implementations on routers have historically been vulnerable to remote attacks, allowing external threat actors to bypass the firewall. This combination of default enablement and inherent vulnerabilities creates a significant and well-documented attack surface.
Why Incorrect Options are Wrong

A. Open virtual private network (VPN): OpenVPN is a security protocol used to create encrypted tunnels. It is not enabled by default and must be explicitly configured by the user to enhance security.

C. Network Address Translation (NAT): NAT is a fundamental router function that enhances security by hiding internal, private IP addresses from the public internet. It is a security feature, not a vulnerability.

D. Domain Name System Security Extensions (DNSSEC): DNSSEC is a security feature that adds cryptographic authentication to DNS responses. Its purpose is to prevent DNS spoofing, thereby strengthening security, not creating an attack surface.

---

References

1. Carnegie Mellon University, Software Engineering Institute, CERT Coordination Center. (2001). Vulnerability Note VU#357851: Multiple vendors' UPnP implementations are vulnerable to buffer overflows. CERT/CC. Retrieved from https://www.kb.cert.org/vuls/id/357851. This official vulnerability note details fundamental flaws in UPnP that allow remote attackers to execute arbitrary code, demonstrating its role in creating a large attack surface.

2. University of Michigan, Information and Technology Services. (2023). Secure Your Home Network. Safe Computing. Retrieved from https://safecomputing.umich.edu/be-aware/personal-devices/secure-your-home-network. In the "Secure Your Router" section, the university explicitly recommends disabling UPnP, stating, "This feature is a security risk and is exploited by malware." This serves as guidance from a reputable academic institution on the protocol's inherent risk.

3. Shulman, H., & Waidner, M. (2014). Security of Home-Routers. Fraunhofer Institute for Secure Information Technology SIT. In Section 3.1, "Universal Plug and Play (UPnP)," the paper discusses how UPnP's design allows any local application to open ports, creating a "major security threat" and noting its default-enabled status on many devices.

Question 13

An IoT systems administrator needs to be able to detect packet injection attacks. Which of the follow methods or technologies is the administrator most likely to implement?
Options
A: Internet Protocol Security (IPSec) with Encapsulating Security Payload (ESP)
B: Point-to-Point Tunneling Protocol (PPTP)
C: Layer 2 Tunneling Protocol (L2TP)
D: Internet Protocol Security (IPSec) with Authentication Headers (AH)
Show Answer
Correct Answer:
Internet Protocol Security (IPSec) with Authentication Headers (AH)
Explanation
Internet Protocol Security (IPSec) with Authentication Headers (AH) is the most appropriate method for detecting packet injection attacks. The AH protocol provides connectionless integrity and data origin authentication for IP datagrams. It calculates an Integrity Check Value (ICV) over the packet, which allows the receiving device to verify that the packet originated from the trusted source and has not been tampered with or maliciously injected in transit. This directly addresses the administrator's requirement to detect such attacks.
Why Incorrect Options are Wrong

A. IPSec with ESP primarily provides confidentiality through encryption. While it can offer authentication, AH is the protocol specifically designed for integrity and authentication without encryption, making it the most direct answer for detecting packet modification/injection.

B. Point-to-Point Tunneling Protocol (PPTP) is an obsolete and insecure protocol with significant known vulnerabilities and should not be used in modern networks.

C. Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol that does not provide any inherent security. It relies on another protocol, typically IPSec, to secure the data it transports.

References

1. Internet Engineering Task Force (IETF) RFC 4302, "IP Authentication Header":

Section 1 (Introduction): "The IP Authentication Header (AH) is used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays... Integrity is provided by the use of a Message Authentication Code (MAC), e.g., HMAC-SHA-1. Data origin authentication is provided by the same mechanism." This directly supports AH's role in verifying packet integrity and origin, which is essential for detecting injection.

2. Internet Engineering Task Force (IETF) RFC 4301, "Security Architecture for the Internet Protocol":

Section 4.1 (Security Services): "AH provides data origin authentication and connectionless integrity for IP datagrams (hereafter referred to as 'authentication')." This document, which defines the overall IPSec architecture, clearly designates AH as the protocol for authentication and integrity services.

3. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson.

Chapter 20, Section 20.1 "IPsec Services": This academic textbook, widely used in university curricula, explains that "The Authentication Header (AH) provides support for data integrity and authentication of IP packets... The authentication service confirms that the message was not modified during transmission." This confirms AH's primary function aligns with the question's requirement.

Question 14

An IoT developer wants to ensure all sensor to portal communications are as secure as possible and do not require any client-side configuration. Which of the following is the developer most likely to use?
Options
A: Virtual Private Networking (VPN)
B: Public Key Infrastructure (PKI)
C: IP Security (IPSec)
D: Secure/Multipurpose Internet Mail Extensions (S/MIME)
Show Answer
Correct Answer:
IP Security (IPSec)
Explanation
IP Security (IPSec) is a protocol suite that operates at the network layer (Layer 3) to secure communications by authenticating and encrypting each IP packet. It can be implemented in a gateway-to-gateway tunnel mode, where a network gateway (like a router or firewall) manages the secure connection on behalf of all devices on its local network. In this configuration, the IoT sensor simply sends its data to the gateway, and the security is applied transparently without requiring any specific software or configuration on the sensor itself. This architecture directly meets the developer's requirements for high security with zero client-side configuration.
Why Incorrect Options are Wrong

A. Virtual Private Networking (VPN): While a VPN provides security, it typically requires a client application and specific configuration on the end device, which violates the "no client-side configuration" requirement.

B. Public Key Infrastructure (PKI): PKI is a framework for managing digital certificates to enable secure communication; it is not a communication protocol itself. It is a necessary component for many security solutions but not the solution in its entirety.

D. Secure/Multipurpose Internet Mail Extensions (S/MIME): S/MIME is a standard designed specifically for encrypting and signing email messages. It is not a suitable protocol for securing general-purpose IoT sensor-to-portal data streams.

---

References

1. Internet Engineering Task Force (IETF). (2005). RFC 4301: Security Architecture for the Internet Protocol. Section 2.1, "Benefits of IPsec." The document states, "IPsec can be implemented in a firewall or router to provide strong security that can be applied to all traffic crossing the perimeter. Security implemented in the firewall is resistant to bypass. ... IPsec in a firewall is also useful for providing security for traffic from hosts that do not implement IPsec." This supports the concept of gateway-based, transparent security for end devices.

2. Kurose, J. F., & Ross, K. W. (2021). Computer Networking: A Top-Down Approach (8th ed.). Pearson. In Chapter 8, Section 8.7, "Network-Layer Security: IPsec and Virtual Private Networks," the text describes IPsec's tunnel mode, where two routers create a secure tunnel. Hosts behind these routers are unaware of IPsec, and their traffic is secured transparently, aligning with the scenario's requirements.

3. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson. Chapter 20, "IP Security," details IPsec's security policy database (SPD) and how it can be configured on a gateway to selectively encrypt traffic for an entire network, abstracting the security function away from individual hosts like an IoT sensor.

Question 15

An IoT security practitioner should be aware of which common misconception regarding data in motion?
Options
A: That transmitted data is point-to-point and therefore a third party does not exist.
B: The assumption that all data is encrypted properly and cannot be exploited.
C: That data can change instantly so old data is of no value.
D: The assumption that network protocols automatically encrypt data on the fly.
Show Answer
Correct Answer:
The assumption that all data is encrypted properly and cannot be exploited.
Explanation
A critical and common misconception in IoT is the assumption that data in motion is inherently secure. This includes false beliefs that the data is properly encrypted, that the underlying protocols handle encryption automatically, or that the implementation is flawless. In reality, many IoT devices transmit data in cleartext or use weak, improperly configured encryption (e.g., outdated TLS versions, weak ciphers), making the data highly vulnerable to interception and manipulation through attacks like Man-in-the-Middle (MITM). Security practitioners must always verify and validate that strong, correctly implemented encryption is used for all data in transit, as this is not a default state.
Why Incorrect Options are Wrong

A. This is a misconception about network topology and threat actors, not directly about the state of the data itself. Attackers can exist on any network segment.

C. This relates to the value and lifecycle of data (data remanence), not the security of its transmission. Old data can be extremely valuable for reconnaissance.

D. This is a specific example of the broader and more comprehensive misconception described in option B. Many common protocols do not encrypt data by default.

---

References

1. OWASP Foundation, "OWASP Internet of Things Project - Top 10 2018," I5: Lack of Transport Encryption. The document explicitly states, "Too often, developers do not consider the network over which their data will be transmitted... data is sent without encryption between the IoT device, the cloud, and the mobile application." This highlights the flawed assumption that data is automatically protected. (Source: OWASP IoT Project, 2018, owasp.org/www-project-internet-of-things/).

2. National Institute of Standards and Technology (NIST), "NISTIR 8259A: IoT Device Cybersecurity Capability Core Baseline," December 2020. Section 4.3, "Data Protection," specifies the capability for "Protecting the confidentiality and integrity of data in transit." The inclusion of this as a core capability underscores that it is not an automatic feature and must be deliberately implemented, countering the misconception that data is secure by default. (Page 10, Section 4.3).

3. Al-Sarawi, S., Anbar, M., Alieyan, K., & Alzubaidi, M. (2017). "Internet of Things (IoT) communication protocols: Review." 2017 8th International Conference on Information Technology (ICIT), pp. 685-690. This academic review details various IoT protocols (e.g., MQTT, CoAP) and notes that security is not inherent. For instance, it states, "MQTT does not provide any security feature by itself," and security must be added via TLS. This directly refutes the misconception that protocols automatically encrypt data. (Section III.A, MQTT Protocol). DOI: https://doi.org/10.1109/ICIT.2017.8077928.

Question 16

A hacker is able to eavesdrop on administrative sessions to remote IoT sensors. Which of the following has most likely been misconfigured or disabled?
Options
A: Secure Shell (SSH)
B: Internet Protocol Security (IPSec)
C: Telnet
D: Virtual private network (VPN)
Show Answer
Correct Answer:
Internet Protocol Security (IPSec)
Explanation
In many Internet of Things (IoT) architectures, remote sensors and devices are managed as a group. To secure communications, a Virtual Private Network (VPN) using the Internet Protocol Security (IPSec) suite is often established between the management station and the remote network gateway. This creates a secure tunnel, encrypting all traffic. Within this tunnel, administrators might use lightweight, unencrypted protocols for sessions, assuming the tunnel provides confidentiality. If the IPSec tunnel is misconfigured or disabled, this layer of protection is lost, and the administrative session traffic is transmitted in cleartext over the public internet, making it vulnerable to eavesdropping.
Why Incorrect Options are Wrong

A. Secure Shell (SSH): SSH is an encrypted protocol. If SSH were being used for the administrative session, eavesdropping would not be possible, even if a network-level tunnel was not active.

C. Telnet: While using the unencrypted Telnet protocol allows eavesdropping, in a properly designed IoT architecture, its use is often restricted to within a secure tunnel (like IPSec). The failure is the misconfiguration of the tunnel that exposes the traffic.

D. Virtual private network (VPN): This is a general term for the technology. IPSec is a specific and common protocol suite used to implement network-layer VPNs, making it a more precise and technically accurate answer.

References

1. National Institute of Standards and Technology (NIST), NISTIR 8259A, IoT Device Cybersecurity Capability Core Baseline, May 2020. Section 3.2, "Device Security," subsection "3.2.1 Data Protection," states: "The IoT device should use a secure and trusted communication channel for all remote network connections... This may be accomplished by the device itself (e.g., by using TLS) or by a trusted component in the deviceโ€™s immediate network environment (e.g., a network gateway that implements a VPN)." This reference supports the architectural pattern where a VPN (often using IPSec) is the primary security control. Its failure would expose underlying communications.

2. Kent, S., & Seo, K. (2005). RFC 4301: Security Architecture for the Internet Protocol. Internet Engineering Task Force (IETF). Section 1.1, "Benefits of IPsec," states that IPSec can provide confidentiality (encryption) for all traffic at the IP layer. A misconfiguration or disabling of this service would negate this benefit, exposing the data payloads to eavesdropping.

3. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson. Chapter 20, "IP Security," details how IPSec provides security for all traffic between two endpoints (e.g., a gateway and a host). The text explains that IPSec's transport and tunnel modes are designed to prevent attacks like eavesdropping. The scenario in the question describes a failure of this preventative mechanism.

Question 17

A corporation's IoT security administrator has configured his IoT endpoints to send their data directly to a database using Secure Sockets Layer (SSL)/Transport Layer Security (TLS). Which entity provides the symmetric key used to secure the data in transit?
Options
A: The administrator's machine
B: The database server
C: The Key Distribution Center (KDC)
D: The IoT endpoint
Show Answer
Correct Answer:
The database server
Explanation
In the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) handshake process, the session's security is anchored by the server's identity. The database server presents its digital certificate, which contains its public key. The client (the IoT endpoint) then generates a random "pre-master secret," encrypts it using the server's public key, and sends it back. The server is the only entity that can decrypt this message using its corresponding private key. Once decrypted, both the server and the client use the shared pre-master secret to independently generate the identical symmetric session key. Although the client generates the initial secret, the server's unique ability to decrypt it and establish the secure context makes it the pivotal entity in providing the key for the session.
Why Incorrect Options are Wrong

A. The administrator's machine: The administrator's machine is used for configuration and management but is not an active participant in the real-time TLS handshake between the endpoint and the server.

C. The Key Distribution Center (KDC): A KDC is a component of other security protocols like Kerberos. It is not a standard entity within the direct client-server SSL/TLS handshake described.

D. The IoT endpoint: While the IoT endpoint (client) generates the pre-master secret in an RSA key exchange, it relies entirely on the server's public key to protect it. The server's role is essential to complete the exchange and establish the trusted session.

---

References

1. Internet Engineering Task Force (IETF) RFC 5246, The Transport Layer Security (TLS) Protocol Version 1.2.

Section 7.4.2, Server Certificate: "The server MUST send a certificate message whenever the agreed-upon key exchange method uses certificates for authentication." This highlights the server's role in providing its authenticated public key.

Section 7.4.7.1, Client Key Exchange Message (RSA): "The client generates a 48-byte premastersecret... It is then encrypted using the public key from the server's certificate... The server, upon receiving it, will decrypt it with its private key." This passage details the server's critical role in using its private key to enable the shared secret.

2. MIT OpenCourseWare, 6.857 Computer and Network Security, Fall 2017.

Lecture 13 Notes, Transport Layer Security (TLS): The lecture notes describe the TLS handshake, specifying that the server sends its certificate and the client encrypts the pre-master secret with the server's public key. The notes emphasize that the server's possession of the corresponding private key is what secures this exchange, making its role fundamental to the key's establishment. (Available via MIT OCW website).

3. Dierks, T., and Rescorla, E. (2008). The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246.

Section F.1.1.2. RSA Key Exchange and Authentication: This appendix details the handshake for RSA-based cipher suites, explicitly stating the server's role in providing the certificate and the client's role in generating and encrypting the pre-master secret. The entire process hinges on the server's asymmetric key pair.

Question 18

An IoT security architect needs to secure data in motion. Which of the following is a common vulnerability used to exploit unsecure data in motion?
Options
A: External flash access
B: Misconfigured Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
C: Databases and datastores
D: Lack of memory space isolation
Show Answer
Correct Answer:
Misconfigured Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
Explanation
Data in motion refers to data actively traveling from one point to another, such as across the internet or a private network. The primary mechanism for securing this data is through encryption protocols like Transport Layer Security (TLS) or its predecessor, Secure Sockets Layer (SSL). A misconfiguration in these protocolsโ€”such as using weak cipher suites, failing to validate certificates properly, or using deprecated versionsโ€”creates a significant vulnerability. Attackers can exploit these weaknesses to perform man-in-the-middle (MitM) attacks, allowing them to intercept, read, and modify the data as it is being transmitted.
Why Incorrect Options are Wrong

A. External flash access: This is a physical hardware vulnerability related to securing data at rest (data stored on the device), not data in motion.

C. Databases and datastores: This vulnerability concerns the security of data at rest, where information is permanently or temporarily stored, not while it is in transit.

D. Lack of memory space isolation: This is a software vulnerability related to securing data in use (data being processed in RAM), not data being transmitted over a network.

References

1. OWASP Foundation. (2018). OWASP Internet of Things Top 10 - 2018. The vulnerability is directly addressed in category "I5 Lack of Transport Encryption," which states that a lack of or weak implementation of encryption during transit exposes data to interception. Misconfigured SSL/TLS is a primary example of this.

2. Fagan, M., et al. (2020). NISTIR 8259A: IoT Device Cybersecurity Capability Core Baseline. National Institute of Standards and Technology. Section 4.3, "Data Protection," emphasizes the capability for "protecting the confidentiality and integrity of data in transit" using "cryptographically-sound communication protocols," such as properly configured TLS.

3. Weber, R. H. (2010). Internet of Things โ€“ New security and privacy challenges. Computer Law & Security Review, 26(1), 23-30. https://doi.org/10.1016/j.clsr.2009.11.008. Page 27 discusses communication security, noting that data transmitted between IoT devices and servers must be encrypted to prevent eavesdropping, highlighting the critical role of transport layer security.

Question 19

An IoT security administrator is determining which cryptographic algorithm she should use to sign her server's digital certificates. Which of the following algorithms should she choose?
Options
A: Rivest Cipher 6 (RC6)
B: Rijndael
C: Diffie-Hellman (DH)
D: Rivest-Shamir-Adleman (RSA)
Show Answer
Correct Answer:
Rivest-Shamir-Adleman (RSA)
Explanation
Digital certificates must be signed to prove their authenticity and integrity. This process requires an asymmetric (public-key) cryptographic algorithm. Rivest-Shamir-Adleman (RSA) is a widely adopted public-key cryptosystem used for both secure data transmission and creating digital signatures. In the context of signing a certificate, the Certificate Authority (or the server in a self-signed scenario) uses its private key to generate the signature. Clients then use the corresponding public key, embedded within the certificate, to verify that the signature is valid and that the certificate has not been tampered with.
Why Incorrect Options are Wrong

A. Rivest Cipher 6 (RC6) is a symmetric-key block cipher designed for encryption and is not used for creating digital signatures, which require asymmetric key pairs.

B. Rijndael is the algorithm that became the Advanced Encryption Standard (AES). It is a symmetric-key block cipher used for data encryption, not digital signing.

C. Diffie-Hellman (DH) is a key exchange protocol. Its purpose is to allow two parties to securely establish a shared secret key over an insecure channel, not to sign data.

References

1. National Institute of Standards and Technology (NIST). (2023). FIPS PUB 186-5: Digital Signature Standard (DSS). Section 6, "Approved Signature Algorithms," explicitly lists RSA as one of the three approved techniques for generating and verifying digital signatures. Available at: https://doi.org/10.6028/NIST.FIPS.186-5

2. Rivest, R., Shamir, A., & Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2), 120โ€“126. The foundational paper describes how the RSA algorithm can be used for digital signatures (Section V, "Digital Signatures"). Available at: https://doi.org/10.1145/359340.359342

3. Katz, J., & Lindell, Y. (2014). Introduction to Modern Cryptography (2nd ed.). CRC Press. Chapter 12, "Digital Signatures," details the "textbook RSA" signature scheme and its practical implementations. This is a standard textbook in university-level cryptography courses.

4. MIT OpenCourseWare. (2014). 6.857 Network and Computer Security, Lecture 8: Public Key Cryptography II. The lecture notes discuss the application of RSA for digital signatures as a core function of public-key cryptography. Available at: https://ocw.mit.edu/courses/6-857-network-and-computer-security-spring-2014/resources/mit6857s14lecture8/

Question 20

An IoT gateway will be brokering data on numerous northbound and southbound interfaces. A security practitioner has the data encrypted while stored on the gateway and encrypted while transmitted across the network. Should this person be concerned with privacy while the data is in use?
Options
A: Yes, because the hash wouldn't protect the integrity of the data.
B: Yes, because the data is vulnerable during processing.
C: No, since the data is already encrypted while at rest and while in motion.
D: No, because the data is inside the CPU's secure region while being used.
Show Answer
Correct Answer:
Yes, because the data is vulnerable during processing.
Explanation
Data security is typically categorized into three states: data in motion (during transmission), data at rest (in storage), and data in use (during processing). The scenario describes protections for the first two states using encryption. However, for a standard CPU to perform computations, data must be decrypted and loaded into system memory (RAM). While in this "in use" state, the unencrypted, plaintext data is vulnerable to memory-scraping malware, unauthorized privileged access, or side-channel attacks that can read the contents of RAM. Therefore, even with robust encryption for data at rest and in motion, a significant privacy risk remains during the processing phase.
Why Incorrect Options are Wrong

A. Hashing is a cryptographic function used to ensure data integrity (that data has not been altered), not confidentiality or privacy. The question is about privacy.

C. This is incorrect because it ignores the third state of data. Securing data at rest and in motion does not automatically secure it while it is being actively processed.

D. This assumes the universal presence of advanced technologies like secure enclaves (e.g., Intel SGX, AMD SEV). Such confidential computing features are not standard on all IoT hardware.

---

References

1. Microsoft Azure Documentation, "Confidential computing overview." Microsoft Corporation, 2023. In the section "The problem: Data in use is vulnerable," it states, "Before confidential computing, any data in use was typically unencrypted and vulnerable... For data to be processed, it must be in memory. This leaves data in memory vulnerable to attacks..." This official vendor documentation confirms that data is vulnerable during processing, supporting the correct answer.

2. Intel Corporation, "Intelยฎ Software Guard Extensions (Intelยฎ SGX) For Dummiesยฎ." John Wiley & Sons, Inc., 2021. Chapter 1, "Understanding the Need for Better Security," p. 8. The document explains, "Data is encrypted when itโ€™s at rest... and in transit... But when data is in use, itโ€™s decrypted and in the clear. This state is when data is most vulnerable." This supports the reasoning that data in use is a critical point of vulnerability and refutes the assumption in option D.

3. David, E., & Riley, L. (2021). Computer Security: A Hands-on Approach (3rd ed.). Chapter 12, "Memory Forensics." This university-level textbook details methods, such as memory acquisition and analysis, that can be used to extract sensitive data (like passwords and encryption keys) directly from a system's RAM, demonstrating the tangible risks to data "in use."

Question 21

A security practitioner wants to encrypt a large datastore. Which of the following is the BEST choice to implement?
Options
A: Asymmetric encryption standards
B: Symmetric encryption standards
C: Elliptic curve cryptography (ECC)
D: Diffie-Hellman (DH) algorithm
Show Answer
Correct Answer:
Symmetric encryption standards
Explanation
Symmetric encryption standards, such as the Advanced Encryption Standard (AES), are the most appropriate choice for encrypting large datastores. These algorithms are designed for high performance and computational efficiency, allowing for the rapid encryption and decryption of large volumes of data (bulk data). Asymmetric encryption is significantly slower and more resource-intensive, making it impractical for this purpose. Symmetric encryption uses a single shared key, which is optimized for high-throughput operations required for encrypting entire databases, file systems, or archives.
Why Incorrect Options are Wrong

A. Asymmetric encryption standards: These are computationally intensive and much slower than symmetric standards, making them unsuitable for encrypting large amounts of data. They are typically used for key exchange.

C. Elliptic curve cryptography (ECC): This is a type of asymmetric encryption. While it offers strong security with smaller key sizes, it is still not designed for bulk data encryption due to performance overhead.

D. Diffie-Hellman (DH) algorithm: This is a key exchange protocol, not an encryption algorithm. It is used to securely establish a shared secret key over an insecure channel, which is then used by a symmetric algorithm.

References

1. National Institute of Standards and Technology (NIST) Special Publication 800-57 Part 1, Revision 5, Recommendation for Key Management.

Section 5.1, "Cryptographic Mechanisms," Page 20: "Symmetric-key algorithms are more efficient (i.e., faster) than asymmetric-key algorithms for protecting data. Therefore, symmetric-key algorithms are typically used to protect data (e.g., for confidentiality or integrity), while asymmetric-key algorithms are used to establish symmetric keys..." This directly supports using symmetric algorithms for bulk data protection.

2. Purdue University, Department of Computer Science, CS 42600, Computer Security.

"Symmetric Key vs. Public Key Cryptography" Lecture Notes: "Symmetric key crypto is much faster (100x to 1000x) than public key crypto. It is used for encrypting large amounts of data." This academic courseware confirms the performance advantage and primary use case for symmetric encryption.

3. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson.

Chapter 2.1, "Symmetric Cipher Model," and Chapter 9.1, "Public-Key Cryptography and RSA": The text consistently explains that symmetric ciphers are used for encrypting large amounts of data (e.g., a file or a database), while public-key (asymmetric) systems are used for key management and digital signatures due to their slow performance.

Question 22

An IoT security administrator wants to encrypt the database used to store sensitive IoT device dat a. Which of the following algorithms should he choose?
Options
A: Triple Data Encryption Standard (3DES)
B: ElGamal
C: Rivest-Shamir-Adleman (RSA)
D: Secure Hash Algorithm 3-512 (SHA3-512)
Show Answer
Correct Answer:
Triple Data Encryption Standard (3DES)
Explanation
The task is to encrypt a database, which involves protecting a large volume of data at rest. This requires a symmetric encryption algorithm, as they are designed for high performance and efficiency in bulk data encryption and decryption. Among the given options, Triple Data Encryption Standard (3DES) is the only symmetric-key block cipher. While 3DES is considered a legacy standard and slower than modern algorithms like AES, it is the only functionally appropriate choice for this specific task from the list provided. Asymmetric algorithms are computationally intensive and too slow for encrypting entire databases.
Why Incorrect Options are Wrong

B. ElGamal: This is an asymmetric encryption algorithm. Asymmetric ciphers are too slow for encrypting large amounts of data and are typically used for key exchange or digital signatures.

C. Rivest-Shamir-Adleman (RSA): Like ElGamal, RSA is an asymmetric algorithm. It is not suitable for bulk data encryption due to its high computational overhead and poor performance compared to symmetric ciphers.

D. Secure Hash Algorithm 3-512 (SHA3-512): This is a cryptographic hash function, not an encryption algorithm. Hashing creates a one-way, fixed-size digest of data for integrity verification and cannot be reversed to recover the original data.

References

1. National Institute of Standards and Technology (NIST). (2020). Special Publication (SP) 800-57 Part 1 Rev. 5: Recommendation for Key Management.

Section 5.2.1, Page 21: States that "Symmetric-key algorithms are more efficient (i.e., faster) than asymmetric-key algorithms for protecting data (e.g., for encryption)." This supports the choice of a symmetric algorithm (3DES) for database encryption.

Section 5.2.2, Page 22: Notes that "Asymmetric-key algorithms are relatively slow and are not used for the encryption of large amounts of data." This directly refutes the use of ElGamal and RSA for this purpose.

2. National Institute of Standards and Technology (NIST). (2015). Federal Information Processing Standards (FIPS) Publication 202: SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions.

Section 1, Page 4: Defines the SHA-3 family as hash functions that produce a "condensed representation of the input message," confirming its purpose is for data integrity, not confidentiality via encryption.

3. Katz, J., & Lindell, Y. (2014). Introduction to Modern Cryptography (2nd ed.). Chapman and Hall/CRC.

Chapter 3, Page 60: Discusses symmetric encryption for applications requiring confidentiality for large amounts of data, contrasting with public-key (asymmetric) encryption, which is less efficient for this task. This academic text reinforces the fundamental principle of using symmetric ciphers for bulk encryption.

Question 23

Which of the following technologies allows for encryption of networking communications without requiring any configuration on IoT endpoints?
Options
A: Transport Layer Security (TLS)
B: Internet Protocol Security (IPSec)
C: Virtual private network (VPN)
D: Elliptic curve cryptography (ECC)
Show Answer
Correct Answer:
Virtual private network (VPN)
Explanation
A Virtual Private Network (VPN), specifically when implemented as a site-to-site or gateway-to-site tunnel, allows for the encryption of all network traffic originating from a local network segment. In this configuration, an IoT gateway or edge router establishes the encrypted tunnel to a remote network. The individual IoT endpoints on the local network simply send their traffic to the gateway, unaware that their communications are being encrypted. This architecture centralizes security management and abstracts the encryption process away from the endpoints, which may be resource-constrained or lack the ability to be configured for other security protocols.
Why Incorrect Options are Wrong

A. Transport Layer Security (TLS): TLS provides end-to-end encryption but requires that the client application on the IoT endpoint be specifically configured to initiate and manage the secure session.

B. Internet Protocol Security (IPSec): While IPSec is the protocol often used to create VPN tunnels, it is not the complete technology. Furthermore, in its "transport mode," IPSec requires configuration on each endpoint.

D. Elliptic curve cryptography (ECC): ECC is a type of cryptographic algorithm, not a network communication technology. It is a component used by protocols like TLS and IPSec to perform key exchange and create digital signatures.

References

1. Cisco. (2020). Fundamentals of IoT Security. Cisco Press. In Chapter 5, "Securing the IoT Network," the text discusses the use of VPNs at the network edge. It explains that VPN gateways can be used to create secure tunnels for IoT traffic, stating, "The use of VPNs can provide confidentiality... without requiring the IoT devices themselves to support complex cryptographic protocols." (Paraphrased from concepts in Chapter 5, Section "VPNs for IoT").

2. Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., & Henry, J. (2017). IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things. Cisco Press. Chapter 11, "IoT Security," describes architectural approaches where security is handled by an edge gateway. The gateway terminates the VPN connection, meaning the devices behind it do not need to be VPN-aware.

3. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet of Things Journal, 4(5), 1125-1142. https://doi.org/10.1109/JIOT.2017.2683200. In Section IV-B, "Network Layer Security," the paper discusses how gateways can be used to implement security measures like VPNs on behalf of resource-constrained devices, thereby providing transparent security.

Question 24

Accompany collects and stores sensitive data from thousands of IoT devices. The company's IoT security administrator is concerned about attacks that compromise confidentiality. Which of the following attacks is the security administrator concerned about? (Choose two.)
Options
A: Salami
B: Aggregation
C: Data diddling
D: Denial of Service (DoS)
E: Inference
Show Answer
Correct Answer:
Aggregation, Inference
Explanation
The administrator's concern is with attacks that compromise confidentiality, meaning the unauthorized disclosure of sensitive information. Aggregation is the technique of combining multiple pieces of non-sensitive data to infer sensitive information. For example, combining IoT sensor data on energy usage, water flow, and motion detection could reveal when occupants are home, which is confidential. Inference is the process of deriving sensitive information from available data through analysis. An attacker could infer a user's health status by analyzing data from a smart appliance and a wearable fitness tracker. Both attacks directly result in learning sensitive information that was not explicitly provided, thus violating confidentiality.
Why Incorrect Options are Wrong

A. Salami: This is a financial fraud attack involving the theft of small amounts of money from many sources, targeting assets rather than data confidentiality.

C. Data diddling: This attack involves the unauthorized alteration of data, which is a violation of data integrity, not confidentiality.

D. Denial of Service (DoS): This attack aims to make a system or service unavailable to legitimate users, thus violating availability, not confidentiality.

References

1. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164. In Section 3.2, "Privacy," the paper discusses how data mining techniques can lead to inference and aggregation attacks in IoT, where "sensitive data about users can be inferred by aggregating information collected from different sources," directly addressing confidentiality breaches. (DOI: https://doi.org/10.1016/j.comnet.2014.11.008)

2. National Institute of Standards and Technology (NIST). (2020). NISTIR 8259A: IoT Device Cybersecurity Capability Core Baseline. Section 2, "How to Use This Document," defines the security objective of Confidentiality as "Preserving authorized restrictions on information access and disclosure." Aggregation and Inference are methods that bypass these restrictions.

3. Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in Computing (5th ed.). Prentice Hall. Chapter 1, "Introduction," defines the core security goals. It classifies Denial of Service (DoS) as an attack on availability (p. 8) and unauthorized data modification, such as Data Diddling, as an attack on integrity (p. 7).

4. Saltzer, J. H., & Schroeder, M. D. (1975). The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9), 1278-1308. This foundational paper defines Confidentiality (controlling who gets to read information), Integrity (controlling unauthorized modification of information), and Availability (ensuring access for authorized parties). DoS and Data Diddling are classic violations of Availability and Integrity, respectively. (DOI: 10.1109/PROC.1975.9939)

Question 25

Which of the following describes the most significant risk created by implementing unverified certificates on an IoT portal?
Options
A: The portal's Internet Protocol (IP) address can more easily be spoofed.
B: Domain Name System (DNS) address records are more susceptible to hijacking.
C: The portal's administrative functions do not require authentication.
D: Man-in-the-middle (MITM) attacks can be used to eavesdrop on communications.
Show Answer
Correct Answer:
Man-in-the-middle (MITM) attacks can be used to eavesdrop on communications.
Explanation
The primary purpose of a digital certificate within a Public Key Infrastructure (PKI) is to provide authenticationโ€”cryptographically verifying that a server (like an IoT portal) is who it claims to be. An unverified certificate, such as a self-signed one or one from an untrusted Certificate Authority (CA), fails this crucial authentication step. This allows an attacker to impersonate the legitimate portal, intercept the communication path, and present their own fraudulent certificate. If the client proceeds despite the verification failure, the attacker can decrypt, read, and modify all traffic between the user and the portal, which is the definition of a Man-in-the-Middle (MITM) attack.
Why Incorrect Options are Wrong

A. IP address spoofing is a network-layer attack that is not directly enabled or prevented by the use of transport-layer security certificates.

B. DNS hijacking is an independent attack that targets the name resolution process. An unverified certificate does not make DNS records more susceptible to hijacking.

C. Administrative authentication is an application-layer security control (e.g., username/password). It is functionally separate from the TLS/SSL certificate used to secure the communication channel.

References

1. National Institute of Standards and Technology (NIST). (2019). Special Publication 800-52 Revision 2: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. Section 3.3.1, "Server Authentication," states, "If the client does not authenticate the server, it has no assurance that it is communicating with the correct server. In this case, the client is susceptible to a man-in-the-middle attack."

2. Saltzer, J. H., & Kaashoek, M. F. (2009). Principles of Computer System Design: An Introduction. MIT OCW 6.033 Courseware. Chapter 9, "Security," Section 9.5.2, "Man-in-the-middle attacks," explains how a failure to verify a server's public key via a trusted certificate chain allows an attacker to impersonate the server and intercept communications.

3. Dierks, T., & Rescorla, E. (2008). The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246. Appendix F.1.1, "Man-in-the-Middle," describes how an active attacker can impersonate a server if the client fails to properly verify the server's certificate.

4. Al-Garadi, M. A., Mohamed, A., Al-Ali, A. K., Du, X., & Guizani, M. (2020). A Survey of IoT-Enabled Cyber-Physical Systems: Attacks, Countermeasures, and Open Issues. IEEE Access, 8, 107021-107045. Section IV-A, "Man-in-the-Middle Attack," discusses how MITM attacks in IoT systems often exploit weak authentication mechanisms, including improper certificate validation. (DOI: https://doi.org/10.1109/ACCESS.2020.3000296)

Question 26

Which of the following is the BEST encryption standard to implement for securing bulk data?
Options
A: Triple Data Encryption Standard (3DES)
B: Advanced Encryption Standard (AES)
C: Rivest Cipher 4 (RC4)
D: Elliptic curve cryptography (ECC)
Show Answer
Correct Answer:
Advanced Encryption Standard (AES)
Explanation
The Advanced Encryption Standard (AES) is the current industry and government standard for symmetric block ciphers. It is designed to be highly efficient in both hardware and software, making it ideal for encrypting large volumes of data, or "bulk data." AES offers strong security with multiple key lengths (128, 192, and 256 bits) and has withstood extensive cryptanalysis. Its combination of speed, security, and widespread adoption makes it the best choice for this purpose.
Why Incorrect Options are Wrong

A. Triple Data Encryption Standard (3DES): This is a legacy symmetric cipher that is significantly slower than AES and has a smaller 64-bit block size, making it less secure and efficient.

C. Rivest Cipher 4 (RC4): This is a stream cipher with known cryptographic vulnerabilities that make it insecure for modern applications; its use is now widely prohibited.

D. Elliptic curve cryptography (ECC): This is an asymmetric algorithm. Asymmetric cryptography is computationally intensive and too slow for encrypting bulk data; it is typically used for key exchange or digital signatures.

References

1. National Institute of Standards and Technology (NIST). (2001). FIPS PUB 197: Advanced Encryption Standard (AES). This publication is the official standard for AES, specifying it as the successor to DES for protecting electronic data. The introduction establishes its role for bulk encryption. (Available at: https://doi.org/10.6028/NIST.FIPS.197)

2. National Institute of Standards and Technology (NIST). (2019). SP 800-131A Rev. 2: Transitioning the Use of Cryptographic Algorithms and Key Lengths. Section 4.1, "TDEA (Triple DES)," states that the use of three-key Triple DES for encryption is disallowed after 2023, officially marking it as a deprecated standard. (Page 13)

3. Popov, A. (2015). RFC 7465: Prohibiting RC4 Cipher Suites. Internet Engineering Task Force (IETF). This document details the security flaws in RC4 and formally prohibits its use in all versions of Transport Layer Security (TLS), confirming it is not a secure option. (Section 2)

4. Katz, J., & Lindell, Y. (2014). Introduction to Modern Cryptography (2nd ed.). Chapman and Hall/CRC. Chapter 10 discusses the principles of public-key (asymmetric) cryptography, like ECC, highlighting that it is "orders of magnitude slower than private-key encryption" and thus unsuitable for encrypting large files. (Section 10.1, Page 328)

Question 27

Which of the following encryption standards should an IoT developer select in order to implement an asymmetric key pair?
Options
A: Temporal Key Integrity Protocol (TKIP)
B: Elliptic curve cryptography (ECC)
C: Advanced Encryption Standard (AES)
D: Triple Data Encryption Standard (3DES)
Show Answer
Correct Answer:
Elliptic curve cryptography (ECC)
Explanation
The question requires selecting an encryption standard that implements an asymmetric key pair. Elliptic curve cryptography (ECC) is a public-key (asymmetric) cryptographic system. It uses a pair of keys: a public key for encryption and a private key for decryption. ECC provides high security with smaller key sizes compared to other asymmetric algorithms like RSA, making it highly efficient and suitable for resource-constrained devices, which are common in the Internet of Things (IoT) ecosystem.
Why Incorrect Options are Wrong

A. Temporal Key Integrity Protocol (TKIP): TKIP is a security protocol for wireless networks. It uses symmetric key cryptography and is now considered deprecated and insecure; it does not use asymmetric key pairs.

C. Advanced Encryption Standard (AES): AES is a symmetric block cipher standard. It uses a single secret key for both the encryption and decryption of data, not a public/private key pair.

D. Triple Data Encryption Standard (3DES): 3DES is a symmetric-key block cipher that applies the DES algorithm three times. Like AES, it uses a single shared key and is not an asymmetric standard.

References

1. National Institute of Standards and Technology (NIST). (2013). FIPS PUB 186-4: Digital Signature Standard (DSS). This publication specifies algorithms for digital signature applications. Section 6, "Elliptic Curve Digital Signature Algorithm (ECDSA)," details the use of ECC, which is fundamentally based on asymmetric key pairs (private and public keys). Available at: https://doi.org/10.6028/NIST.FIPS.186-4

2. National Institute of Standards and Technology (NIST). (2001). FIPS PUB 197: Advanced Encryption Standard (AES). The abstract and introduction explicitly define AES as a symmetric block cipher that uses the same key for encrypting and decrypting data. Available at: https://doi.org/10.6028/NIST.FIPS.197

3. National Institute of Standards and Technology (NIST). (2017). Special Publication 800-67 Revision 2: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. This document specifies the TDEA (commonly known as 3DES), defining it as a symmetric key block cipher algorithm. Available at: https://doi.org/10.6028/NIST.SP.800-67r2

4. Hite, D. (2017). An Examination of the Security of the Internet of Things. University of Tennessee at Chattanooga, UTC Scholar, Theses and Dissertations. Page 17 discusses ECC as a lightweight public-key cryptography solution ideal for IoT due to its efficiency with smaller key sizes compared to RSA. Available at: https://scholar.utc.edu/theses/488

Question 28

An IoT systems administrator wants to ensure that all data stored on remote IoT gateways is unreadable. Which of the following technologies is the administrator most likely to implement?
Options
A: Secure Hypertext Transmission Protocol (HTTPS)
B: Internet Protocol Security (IPSec)
C: Triple Data Encryption Standard (3DES)
D: Message Digest 5 (MD5)
Show Answer
Correct Answer:
Triple Data Encryption Standard (3DES)
Explanation
The question requires a technology to make "data stored" on IoT gateways unreadable. This refers to protecting data at rest. Triple Data Encryption Standard (3DES) is a symmetric-key block cipher algorithm used for encryption. It can be implemented in software or hardware to encrypt files, databases, or entire storage volumes, directly addressing the need to make stored data unreadable to unauthorized parties. While now considered legacy and superseded by AES, it is the only option listed that is an encryption standard specifically for rendering data confidential.
Why Incorrect Options are Wrong

A. Secure Hypertext Transmission Protocol (HTTPS): This protocol encrypts data in transit, specifically for web traffic between a client and a server. It does not protect data stored on a device's disk.

B. Internet Protocol Security (IPSec): This is a protocol suite that secures network communications at the IP layer, typically for creating VPNs. It protects data in transit, not data at rest on a local gateway.

D. Message Digest 5 (MD5): This is a cryptographic hash function, not an encryption algorithm. It creates a unique, fixed-size fingerprint of data for integrity verification but cannot be reversed to recover the original data.

References

1. National Institute of Standards and Technology (NIST), FIPS PUB 46-3, Data Encryption Standard (DES), October 25, 1999.

Section 1, Specification: "This standard specifies two cryptographic algorithms, the Data Encryption Algorithm (DEA) and the Triple Data Encryption Algorithm (TDEA)... These algorithms may be used to protect sensitive but unclassified computer data." This source confirms that 3DES (TDEA) is an algorithm for encrypting data.

2. National Institute of Standards and Technology (NIST), Special Publication 800-111, Guide to Storage Encryption Technologies for End User Devices, November 2007.

Section 2.1, Full Disk Encryption: "Full disk encryption (FDE)... encrypts all data on a disk... FDE products use standard, public-key cryptographic algorithms such as AES and Triple DES to encrypt the data on the disk." This document explicitly links Triple DES to the encryption of stored data.

3. Internet Engineering Task Force (IETF), RFC 4301, Security Architecture for the Internet Protocol, December 2005.

Section 1.1, About This Document: "This document describes the security architecture for IP, which is designed to provide security services at the IP layer... These services are provided by using two traffic security protocols, the Authentication Header (AH) and the Encapsulating Security Payload (ESP)..." This confirms IPSec's role in securing network traffic (data in transit).

4. Internet Engineering Task Force (IETF), RFC 2818, HTTP Over TLS, May 2000.

Section 1, Introduction: "This memo describes how to use Transport Layer Security (TLS) to secure HTTP connections over the Internet." This defines HTTPS as a mechanism for securing data in transit.

5. Internet Engineering Task Force (IETF), RFC 1321, The MD5 Message-Digest Algorithm, April 1992.

Abstract: "This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit 'fingerprint' or 'message digest' of the input." This establishes MD5 as a hashing algorithm for creating a digest, not for encryption/decryption.

Question 29

In designing the campus of an IoT device manufacturer, a security consultant was hired to recommend best practices for deterring criminal behavior. Which of the following approaches would he have used to meet his client's needs?
Options
A: Crime Prevention Through Environmental Design (CPTED)
B: British Standard 7799 part 3 (BS 7799-3)
C: International Organization for Standardization 17799 (ISO 17799)
D: National Institute of Standards and Technology Cybersecurity Framework (NIST CSF)
Show Answer
Correct Answer:
Crime Prevention Through Environmental Design (CPTED)
Explanation
Crime Prevention Through Environmental Design (CPTED) is a multi-disciplinary approach that uses urban and architectural design to deter criminal behavior. Its core principlesโ€”natural surveillance, natural access control, territorial reinforcement, and maintenanceโ€”are specifically aimed at manipulating the built environment to reduce the opportunity for crime. This methodology directly addresses the consultant's task of designing a physical campus to deter criminal activity, making it the most appropriate approach among the choices. The other options are frameworks focused on information and cybersecurity, not physical environmental security design.
Why Incorrect Options are Wrong

B. British Standard 7799 part 3 (BS 7799-3): This is an outdated standard focused on guidelines for information security risk management, not the physical design of a campus to deter general crime.

C. International Organization for Standardization 17799 (ISO 17799): This standard, now ISO/IEC 27002, provides a code of practice for information security controls, not a methodology for general crime prevention through environmental design.

D. National Institute of Standards and Technology Cybersecurity Framework (NIST CSF): This is a voluntary framework consisting of standards, guidelines, and best practices to manage cybersecurity-related risk, not physical security design for a campus.

---

References

1. CPTED: Crowe, T. D. (2000). Crime Prevention Through Environmental Design: Applications of Architectural Design and Space Management Concepts (2nd ed.). National Crime Prevention Institute. As cited in Cozens, P. M., & Love, T. (2015). A Review and Current Status of Crime Prevention through Environmental Design (CPTED). Journal of Planning Literature, 30(4), 393โ€“412. (See Section: "The CPTED Concept", pp. 394-395). https://doi.org/10.1177/0885412215595440

2. NIST CSF: National Institute of Standards and Technology. (2018). Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1. U.S. Department of Commerce. (See Section 1.1, "Framework Purpose," p. 1, which states its focus is on reducing cybersecurity risk). https://doi.org/10.6028/NIST.CSWP.04162018

3. ISO 17799 / ISO/IEC 27002: International Organization for Standardization. (2022). ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection โ€” Information security controls. The scope is defined as providing a reference set of generic information security controls. (See Introduction, Section 0.1 "General").

4. BS 7799-3: The British Standards Institution. (2006). BS 7799-3:2006 Information security management systems. Guidelines for information security risk management. This standard's scope was explicitly limited to information security risk management and served as a basis for the later ISO/IEC 27005 standard.

Question 30

An IoT security administrator is concerned that someone could physically connect to his network and scan for vulnerable devices. Which of the following solutions should he install to prevent this kind of attack?
Options
A: Media Access Control (MAC)
B: Network Access Control (NAC)
C: Host Intrusion Detection System (HIDS)
D: Network Intrusion Detection System (NIDS)
Show Answer
Correct Answer:
Network Access Control (NAC)
Explanation
Network Access Control (NAC) is the most appropriate solution to prevent the described attack. NAC systems are designed to enforce security policies on all devices seeking to access a network. When an unauthorized device is physically connected to a network port, the NAC solution can identify it, check it against predefined policies (e.g., is it a known corporate asset, does it have required security software), and subsequently block or quarantine it before it can gain access to network resources and begin scanning. This directly prevents the unauthorized connection from becoming a threat.
Why Incorrect Options are Wrong

A. Media Access Control (MAC): This is a sublayer of the data link layer. While MAC address filtering can be used for security, it is easily bypassed by spoofing the MAC address of an authorized device.

C. Host Intrusion Detection System (HIDS): A HIDS is installed on an individual device (a host) to monitor its internal activity. It cannot prevent a new, unauthorized device from connecting to the network itself.

D. Network Intrusion Detection System (NIDS): A NIDS is a detective control, not a preventative one. It would alert the administrator that scanning is occurring after the unauthorized device has already connected and started its attack, but it would not prevent the initial access.

---

References

1. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson.

Section 21.5, "Network Access Control," describes NAC as an approach that "attempts to unify endpoint security technology... user or system authentication, and network security enforcement." It explicitly states that a primary function is to enforce policies and control access at the point a device attempts to join the network.

2. Carnegie Mellon University, Software Engineering Institute (SEI). (2008). Network Access Control: A Glass Half Full.

Paragraph 1: "The primary goal of NAC is to prevent unauthorized and non-compliant systems from accessing the corporate network... NAC solutions enforce policies that a device must meet before it is allowed on the network." This source clearly defines NAC as a preventative measure against unauthorized connections.

3. Cisco. (n.d.). What Is Network Access Control (NAC)?

Overview Section: "Network access control (NAC) is a security solution that helps to enforce security policy compliance on all devices seeking to access network computing resources... When a device is noncompliant, NAC can deny network access..." This official vendor documentation confirms that NAC's role is to prevent non-compliant or unauthorized devices from gaining access.

4. Kim, D., & Solomon, M. G. (2016). Fundamentals of Information Systems Security (3rd ed.). Jones & Bartlett Learning.

Chapter 6, "Network Security," distinguishes between Intrusion Detection Systems (IDS) and preventative controls. It clarifies that an IDS (like NIDS) is a "detective control" that identifies potential intrusions, whereas NAC is presented as a mechanism to "control access to a network." This supports the distinction that NIDS detects while NAC prevents.

Question 31

Which of the following is one way to implement countermeasures on an IoT gateway to ensure physical security?
Options
A: Add tamper detection to the enclosure
B: Limit physical access to ports when possible
C: Allow quick administrator access for mitigation
D: Implement features in software instead of hardware
Show Answer
Correct Answer:
Limit physical access to ports when possible
Explanation
Limiting physical access to ports is a fundamental and critical countermeasure for securing an IoT gateway. Unprotected ports, such as USB, JTAG, or serial console ports, represent a significant physical attack surface. An attacker with physical access could use these ports to dump firmware, access a command-line interface, bypass security controls, or introduce malicious code. By disabling unused ports in the software/firmware or physically blocking them (e.g., with epoxy or locking covers), an organization can effectively prevent these common physical attack vectors, thereby hardening the device against unauthorized access and tampering.
Why Incorrect Options are Wrong

A. Add tamper detection to the enclosure: While a valid physical security measure, it is primarily a detective control that alerts on a breach, whereas limiting port access is a preventative control that stops the breach from occurring.

C. Allow quick administrator access for mitigation: This is an incident response procedure, not a direct physical security countermeasure implemented on the gateway to prevent or detect an attack.

D. Implement features in software instead of hardware: This is contrary to security best practices. Hardware-based security is generally more robust and resistant to tampering than software-only implementations.

References

1. NISTIR 8259A, "IoT Device Cybersecurity Capability Core Baseline" (May 2020): In Section 3.2, "Device Security," the document specifies the core baseline capability 3.2.5 Physical Interfaces: "The IoT device should restrict the logical access that authenticated and unauthenticated users and processes have to its physical interfaces (e.g., USB, JTAG, UART)." This directly supports the practice of limiting port access as a key security measure.

2. ENISA (European Union Agency for Cybersecurity), "Good Practices for IoT and Smart Infrastructures Security" (November 2018): In Section 4.2.1, "Physical Security," under the "Device Layer" recommendations, the guide states: "Unused ports should be disabled and protected (e.g. USB ports)." This highlights port protection as a standard good practice for IoT device hardening.

3. OWASP, "IoT Security Verification Standard (ISVS)" (Version 2.1.0, 2023): In section V8, "Hardware Security," requirement ISVS-HS-2 states: "Verify that all external ports and debugging interfaces that are not needed for the device's operation are disabled." This emphasizes disabling ports as a verifiable security requirement for IoT hardware.

Question 32

Which of the following methods or technologies is most likely to be used to protect an IoT portal against protocol fuzzing?
Options
A: Secure Hypertext Transfer Protocol (HTTPS)
B: Public Key Infrastructure (PKI)
C: Next-Generation Firewall (NGFW)
D: Hash-based Message Authentication Code (HMAC)
Show Answer
Correct Answer:
Next-Generation Firewall (NGFW)
Explanation
A Next-Generation Firewall (NGFW) is the most effective technology listed for protecting against protocol fuzzing. NGFWs incorporate deep packet inspection (DPI) and Intrusion Prevention System (IPS) functionalities. This allows them to analyze network traffic beyond simple port and IP address filtering, inspecting the actual content and structure of application-layer protocols. By decoding and validating the protocol, an NGFW can identify and block malformed or non-standard packets used in fuzzing attacks before they reach the IoT portal, thus preventing potential crashes or the exploitation of vulnerabilities.
Why Incorrect Options are Wrong

A. Secure Hypertext Transfer Protocol (HTTPS) encrypts data in transit but does not inspect the protocol for malformations; the fuzzed data is still delivered to the server.

B. Public Key Infrastructure (PKI) is a framework for managing digital certificates to establish trust and enable encryption; it does not analyze network packet structure.

D. Hash-based Message Authentication Code (HMAC) ensures message integrity and authenticity but does not prevent an authenticated source from sending a correctly signed but malformed message.

---

References

1. On NGFW Capabilities:

Stewart, J. M., Chapple, M., & Gibson, D. (2021). CISSP Certified Information Systems Security Professional Official Study Guide (9th ed.). Sybex. In Chapter 21, "Managing Security Operations," the text describes Next-Generation Firewalls (NGFWs) as application-aware devices that can perform deep packet inspection to identify and block malicious traffic, including protocol anomalies, which is the basis of a fuzzing attack. (Note: While a certification guide, CISSP materials are widely recognized as authoritative in academic and professional security contexts).

2. On Deep Packet Inspection and Protocol Analysis:

Stallings, W., & Brown, L. (2018). Computer Security: Principles and Practice (4th ed.). Pearson. In Chapter 21, "Firewalls and Intrusion Prevention Systems," the role of an IPS (a core component of an NGFW) is detailed. Section 21.2 explains that an IPS can use "protocol anomaly" detection to identify "unexpected packet header values" and "application protocol anomaly" detection to find non-standard application traffic, which directly addresses the nature of protocol fuzzing.

3. On Fuzzing as an Attack Vector:

Sutton, M., Greene, A., & Amini, P. (2007). Fuzzing: Brute Force Vulnerability Discovery. Addison-Wesley Professional. Chapter 1, "The Philosophy of Fuzzing," defines fuzzing as a method of identifying implementation bugs using malformed or semi-malformed data injection. This highlights that the attack relies on malformed data, which security devices like NGFWs are designed to detect via protocol validation.

Question 33

A manufacturer wants to ensure that user account information is isolated from physical attacks by storing credentials off-device. Which of the following methods or technologies best satisfies this requirement?
Options
A: Role-Based Access Control (RBAC)
B: Password Authentication Protocol (PAP)
C: Remote Authentication Dial-In User Service (RADIUS)
D: Border Gateway Protocol (BGP)
Show Answer
Correct Answer:
Remote Authentication Dial-In User Service (RADIUS)
Explanation
Remote Authentication Dial-In User Service (RADIUS) is a client-server networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management. In a RADIUS architecture, the network access device (e.g., a switch or wireless access point) acts as a client and forwards authentication requests from users to a central RADIUS server. This server contains the user credential database. This model inherently stores credentials "off-device," directly satisfying the manufacturer's requirement to isolate user account information from physical attacks on the end device.
Why Incorrect Options are Wrong

A. Role-Based Access Control (RBAC) is an authorization model that grants permissions based on user roles; it does not handle the authentication process or credential storage location.

B. Password Authentication Protocol (PAP) is an insecure authentication method that transmits passwords in cleartext. It is a protocol, not a system for centralized, off-device credential storage.

D. Border Gateway Protocol (BGP) is a core routing protocol of the internet used to exchange routing information between autonomous systems. It is unrelated to user authentication.

References

1. Rigney, C., Willens, S., Rubens, A., & Simpson, W. (2000). RFC 2865: Remote Authentication Dial In User Service (RADIUS). The Internet Engineering Task Force (IETF). Section 1, "Introduction," states, "The server is responsible for receiving user connection requests, authenticating the user...". This establishes the centralized, off-device authentication model. Available at: https://doi.org/10.17487/RFC2865

2. Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.). Pearson. Chapter 8.7, "Securing Wireless LANs," describes the use of an authentication server (AS) in 802.1X, which is typically a RADIUS server, to authenticate users without storing credentials on the access point itself.

3. Cisco. (2017). RADIUS Protocol Overview. Cisco Systems, Inc. The document states, "RADIUS is a distributed client/server system that secures networks against unauthorized access... RADIUS clients run on Cisco routers and send authentication requests to a central RADIUS server that contains all user authentication and network service access information." (Document ID: 12433).

Question 34

An IoT device which allows unprotected shell access via console ports is most vulnerable to which of the following risks?
Options
A: Directory harvesting
B: Rainbow table attacks
C: Malware installation
D: Buffer overflow
Show Answer
Correct Answer:
Malware installation
Explanation
Unprotected shell access via a console port (such as UART) provides an attacker with direct, often privileged, command-line control over the device's operating system. This level of access is one of the most critical vulnerabilities as it allows the attacker to execute arbitrary commands. The most significant and direct risk from this capability is the ability to download and execute malicious software. This allows an attacker to install persistent malware, enroll the device in a botnet (e.g., Mirai), exfiltrate data, or use the compromised device as a pivot point to attack other systems on the internal network.
Why Incorrect Options are Wrong

A. Directory harvesting: This is an information-gathering technique to find valid resource names. While possible with shell access, it is a far less severe risk than complete system compromise via malware.

B. Rainbow table attacks: These attacks are used to crack password hashes. The scenario specifies "unprotected" access, meaning no authentication is required, rendering this attack method irrelevant for gaining initial access.

D. Buffer overflow: This is a type of software vulnerability that could be used to gain shell access. It is a cause, not a direct risk or consequence of already having unprotected access.

References

1. Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., & Ghani, N. (2019). A Survey on IoT Security: Challenges, Approaches, and New Trends. IEEE Access, 7, 14307-14326. DOI: https://doi.org/10.1109/ACCESS.2019.2915748.

In Section IV-A, "Physical Layer Attacks," the paper states: "Attackers can also get a root shell on the device through the UART interface. With root access, attackers can do anything they want, such as installing malicious software or stealing sensitive information." This directly links unprotected shell access via physical ports to the risk of malware installation.

2. OWASP Foundation. (2018). OWASP Internet of Things Top 10 - 2018. OWASP.

Reference vulnerability "I8:2018-Insecure Default Settings" discusses how devices may ship with insecure settings, such as open debugging ports that provide shell access. The document notes that the impact of exploitation is "a full compromise of the device," which is typically achieved by installing malicious code to maintain control and carry out further attacks.

Question 35

An embedded developer is about to release an IoT gateway. Which of the following precautions must be taken to minimize attacks due to physical access?
Options
A: Allow access only to the software
B: Remove all unneeded physical ports
C: Install a firewall on network ports
D: Allow easy access to components
Show Answer
Correct Answer:
Remove all unneeded physical ports
Explanation
To minimize attacks from physical access, hardware hardening is essential. Unnecessary physical ports, such as JTAG, UART, or USB, are often left on production IoT devices for debugging or manufacturing purposes. However, these ports provide a direct interface to the device's hardware and firmware. An attacker with physical access can exploit them to bypass software security, dump sensitive information like firmware or cryptographic keys, or gain privileged shell access. Removing or permanently disabling these unneeded ports is a fundamental and effective precaution to eliminate these specific attack vectors, thereby enhancing the device's physical security posture.
Why Incorrect Options are Wrong

A. This is a logical access control measure and does not protect against an attacker physically tampering with the hardware itself.

C. A firewall is a network security control that filters traffic; it offers no protection against an attacker with direct physical access to the device.

D. Allowing easy access to components would significantly increase the risk of physical attacks, making it easier to tamper with or reverse-engineer the hardware.

References

1. OWASP Foundation, OWASP Internet of Things Top 10 2018, I10: Lack of Physical Hardening. The document states, "Lack of physical hardening allows potential attackers to gain sensitive information that can help them to perform a remote attack or to take local control of the device... Attackers can gain access to the system by connecting to exposed ports (e.g., UART, JTAG)." It recommends disabling or removing these ports in production devices.

2. Chantzis, F., St-Hilaire, M., & Rogers, S. (2017). A Practical Guide to Hacking the Internet of Things. Johns Hopkins University Information Security Institute. Section 3.1, "Hardware Hacking," details how attackers use debug ports like JTAG and UART for reverse engineering and gaining access. The report implicitly supports the removal of such ports as a security measure by demonstrating the high risk they pose.

3. NISTIR 8259A, IoT Device Cybersecurity Capability Core Baseline. (May 2020). Section 3.3, "Device Security," emphasizes the need to protect device interfaces. While focused on logical interfaces, the principle of restricting access is paramount. The document states, "The IoT device should restrict logical access to its local and network interfaces to only authorized entities." Removing physical interfaces is the ultimate restriction for unauthorized physical entities.

Shopping Cart
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail $6 DISCOUNT on YOUR PURCHASE