Which of the following attacks utilizes Media Access Control (MAC) address spoofing?
B
Explanation:
Reference: https://www.comparitech.com/net-admin/spoofing-attacks-guide/
In order to successfully perform a man-in-the-middle (MITM) attack against a secure website, which
of the following could be true?
C
Explanation:
Reference: https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/
An IoT security administrator wishes to mitigate the risk of falling victim to Distributed Denial of
Service (DDoS) attacks. Which of the following mitigation strategies should the security administrator
implement? (Choose two.)
D, E
An IoT security administrator is concerned about an external attacker using the internal device
management local area network (LAN) to compromise his IoT devices. Which of the following
countermeasures should the security administrator implement? (Choose three.)
B, D, G
Which of the following attacks is a reflected Distributed Denial of Service (DDoS) attack?
C
Explanation:
Reference: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
An IoT security architect wants to implement Bluetooth between two nodes. The Elliptic Curve Diffie-
Hellman (ECDH) cipher suite has been identified as a requirement. Which of the following Bluetooth
versions can meet this requirement?
D
Explanation:
Reference:
https://www.symmetryelectronics.com/blog/ble-4-1-vs-ble-4-2-new-features-and-
advantages/
An IoT security administrator realizes that when he attempts to visit the administrative website for
his devices, he is sent to a fake website. To which of the following attacks has he likely fallen victim?
D
Network filters based on Ethernet burned-in-addresses are vulnerable to which of the following
attacks?
A
An IoT security architect needs to minimize the security risk of a radio frequency (RF) mesh
application. Which of the following might the architect consider as part of the design?
B
Explanation:
Reference: https://www.bmc.com/blogs/osi-model-7-layers/
Which of the following methods is an IoT portal administrator most likely to use in order to mitigate
Distributed Denial of Service (DDoS) attacks?
C
Explanation:
Reference: https://www.computerweekly.com/news/252456702/How-traffic-scrubbing-can-guard-
against-DDoS-attacks
A DevOps engineer wants to provide secure network services to an IoT/cloud solution. Which of the
following countermeasures should be implemented to mitigate network attacks that can render a
network useless?
B
Explanation:
Reference:
https://www.cloudflare.com/learning/ddos/what-is-a-ddos-
attack/#:~:text=A%20distributed%20denial%2Dof%2Dservice,a%20flood%20of%20Internet%20traffic
What is one popular network protocol that is usually enabled by default on home routers that
creates a large attack surface?
B
Explanation:
Reference: https://phoenixnap.com/blog/what-is-upnp
An IoT systems administrator needs to be able to detect packet injection attacks. Which of the follow
methods or technologies is the administrator most likely to implement?
D
Explanation:
Reference: https://www.techtarget.com/searchsecurity/definition/IPsec-Internet-Protocol-Security
An IoT developer wants to ensure all sensor to portal communications are as secure as possible and
do not require any client-side configuration. Which of the following is the developer most likely to
use?
C
An IoT security practitioner should be aware of which common misconception regarding data in
motion?
B