Questions for the ITS-110 were updated on : Nov 21 ,2025
A site administrator is not enforcing strong passwords or password complexity. To which of the
following types of attacks is this system probably MOST vulnerable?
B
Explanation:
Reference: https://www.techtarget.com/searchsecurity/definition/dictionary-attack
Which of the following methods or technologies is most likely to be used in order to mitigate brute
force attacks?
A
Explanation:
Reference:
https://www.sciencedirect.com/topics/computer-science/account-lockout-
policy#:~:text=Account%20lockout%20policies%20are%20used,twice%2C%20but%20not%20numero
us%20times
An IoT system administrator wants to mitigate the risk of rainbow table attacks. Which of the
following methods or technologies can the administrator implement in order to address this
concern?
B
If an attacker were able to gain access to a user's machine on your network, which of the following
actions would she most likely take next?
D
A developer needs to implement a highly secure authentication method for an IoT web portal. Which
of the following authentication methods offers the highest level of identity assurance for end users?
D
Explanation:
Reference:
https://www.techtarget.com/search/query?q=Multi-
factor+authentication+with+three+factors
A hacker is attempting to exploit a known software flaw in an IoT portal in order to modify the site's
administrative configuration. Which of the following BEST describes the type of attack the hacker is
performing?
A
Explanation:
Reference: https://www.cynet.com/network-attacks/privilege-escalation/
Which of the following functions can be added to the authorization component of AAA to enable the
principal of least privilege with flexibility?
B
Passwords should be stored…
C
Explanation:
Reference: https://snyk.io/learn/password-storage-best-practices/
In order to minimize the risk of abusing access controls, which of the following is a good example of
granular access control implementation?
B
Which of the following techniques protects the confidentiality of the information stored in
databases?
D
During a brute force test on his users’ passwords, the security administrator found several passwords
that were cracked quickly. Which of the following passwords would have taken the longest to crack?
B
A developer needs to apply a family of protocols to mediate network access. Authentication and
Authorization has been implemented properly. Which of the following is the missing component?
C
An IoT developer wants to ensure that their cloud management portal is protected against
compromised end-user credentials. Which of the following technologies should the developer
implement?
C
Explanation:
Reference: https://en.wikipedia.org/wiki/Multi-factor_authentication
An OT security practitioner wants to implement two-factor authentication (2FA). Which of the
following is the least secure method to use for implementation?
B
An embedded engineer wants to implement security features to be sure that the IoT gateway under
development will only load verified images. Which of the following countermeasures could be used
to achieve this goal?
B