Certified Internet of Things Security Practitioner

Here you have the best CertNexus ITS-110 practice exam questions

  • You have 100 total questions to study from
  • Each page has 5 questions, making a total of 20 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on October 31, 2025
  • This site is not affiliated with or endorsed by CertNexus.
Question 1 of 100
Which of the following attacks utilizes Media Access Control (MAC) address spoofing?
    Correct Answer: B

Question 2 of 100
Which of the following attacks is a reflected Distributed Denial of Service (DDoS) attack?
    Correct Answer: C

Question 3 of 100
An IoT security architect wants to implement Bluetooth between two nodes. The Elliptic Curve Diffie-Hellman (ECDH) cipher suite has been identified as a requirement. Which of the following Bluetooth versions can meet this requirement?
    Correct Answer: D

Question 4 of 100
An IoT security administrator realizes that when he attempts to visit the administrative website for his devices, he is sent to a fake website. To which of the following attacks has he likely fallen victim?
    Correct Answer: D

Question 5 of 100
Network filters based on Ethernet burned-in-addresses are vulnerable to which of the following attacks?
    Correct Answer: A