Correct Answer: You Answered
Correct Answer: You Answered
Correct Answer: You Answered
0 / 2 pts
Which popular exploit used by threat actors intercepts a system update and
injects an update of their own?
Correct Answer
firmware replacement
routing attack
eavesdropping attack
You Answered
SQL injections
Question 2
2 / 2 pts
How does UPnP assist a user to easily set up network-enabled devices?
Correct!
Question 3
0 / 2 pts
What is a characteristic of the message queueing telemetry transport (MQTT)
protocol?
You Answered
Correct Answer
Question 4
0 / 2 pts
A threat actor has hijacked a session to assume the identity of a valid user. Which
web front-end vulnerability is the threat actor exploiting?
You Answered
security misconfiguration
SQL injections
cross-site scripting
Correct Answer
broken authentication
Question 5
0 / 2 pts
Which password is the most hardened password for use on an IoT device?
You Answered
12gnkjl9!!!ddfgr
ajkyfrjn0999y*
Correct Answer
Hnmmmkoty#4
1245rdghy67#
Question 6
2 / 2 pts
A client wants to deploy MQTT on a large enterprise network and is worried
about the security of MQTT. The client wants all messages encrypted, including
all messages between the broker and clients. What could the client do to achieve
this goal?
Correct!
Question 7
2 / 2 pts
What is one of the most widely exposed vulnerabilities listed by the Open Web
Applications Security Project (OWASP)?
Correct!
single-factor authentication
malware
botnets
adware
Question 8
0 / 2 pts
What are two of the most widely exposed vulnerabilities currently listed by the
Open Web Applications Security Project (OWASP)? (Choose two.)
Correct Answer
username enumeration
You Answered
spam
You Answered
phishing
Correct Answer
account lockout
malware
Question 9
0 / 2 pts
What is a commonly exposed mobile application vulnerability?
user enumeration
You Answered
malware
Correct Answer
SQL injections
Question 10
2 / 2 pts
A threat actor has injected JavaScript code into the output of a web application
and is manipulating client-side scripts to run as desired in the browser. Which
web front-end vulnerability is the threat actor exploiting?
Correct!
cross-site scripting
broken authentication
SQL injections
security misconfiguration
Question 11
2 / 2 pts
For which type of devices is the use of DDS (data distribution service) in M2M
connections well suited?
for devices that require a collection of data for centralized storage and filtration
for devices where live data is not the only data and which use a client-server
model
Correct!
for devices that measure real-time data in microseconds that need to be filtered
and delivered efficiently
Refer to curriculum topic: 5.1.3
Devices that measure real-time data in microseconds are good candidates for
DDS (data distribution service). DDS will filter the data and send the required
data efficiently to endpoints requiring it. DDS is the protocol of choice when
dealing with applications that require speed and reliability.
Question 12
0 / 2 pts
What is the safest way to prevent an XXE attack?
Correct Answer
You Answered
Use SSL encryption on all traffic between the server and external clients.
Question 13
0 / 2 pts
What is a characteristic of the constrained application protocol (CoAP)?
Correct Answer
You Answered
It is primarily designed to collect data from many devices and deliver that data to
the IT infrastructure.
It supports the last will and testament option.
It is mostly used for multiple clients where live data is the only data.
Question 14
0 / 2 pts
Which attack involves a compromise of data that occurs between two end points?
You Answered
username enumeration
denial-of-service
Correct Answer
man-in-the-middle attack
Question 15
0 / 2 pts
What is a characteristic of the message queueing telemetry transport (MQTT)
publish-subscribe model?
You Answered
The last will and testament option allows for immediate session termination, thus
saving power.
Clients that are connected will prevent other clients from connecting, thus
preserving power.
Clients are prevented from subscribing to any subtopics in order to keep traffic to
a minimum.
Correct Answer
It allows for a retained messages option that can be used to provide status
updates.
Question 1
0 / 2 pts
What is a characteristic of Extensible Messaging and Presence Protocol (XMPP)?
You Answered
It uses a publish-subscribe Model and supports the last will and testament option.
Correct Answer
Question 2
0 / 2 pts
A threat actor has injected JavaScript code into the output of a web application
and is manipulating client-side scripts to run as desired in the browser. Which
web front-end vulnerability is the threat actor exploiting?
You Answered
SQL injections
broken authentication
Correct Answer
cross-site scripting
security misconfiguration
Refer to curriculum topic: 5.1.2
Web front-end vulnerabilities apply to apps, APIs, and services. Some of the most
significant vulnerabilities are as follows:
Question 3
0 / 2 pts
Which password is the most hardened password for use on an IoT device?
Correct Answer
Hnmmmkoty#4
You Answered
ajkyfrjn0999y*
12gnkjl9!!!ddfgr
1245rdghy67#
Question 4
0 / 2 pts
What are two of the most widely exposed vulnerabilities currently listed by the
Open Web Applications Security Project (OWASP)? (Choose two.)
malware
spam
Correct!
account lockout
You Answered
phishing
Correct Answer
username enumeration
Question 5
0 / 2 pts
What is a commonly exposed mobile application vulnerability?
You Answered
malware
user enumeration
Correct Answer
SQL injections
Question 6
0 / 2 pts
What is a characteristic of the Constrained Application Protocol (CoAP)?
You Answered
Correct Answer
Question 7
0 / 2 pts
Which attack involves a compromise of data that occurs between two end points?
username enumeration
Correct Answer
man-in-the-middle attack
You Answered
denial-of-service
Question 8
2 / 2 pts
Which popular exploit used by threat actors fills the communications channel so
that the targeted device responds to requests late or not at all?
eavesdropping attack
Correct!
DoS
phishing
routing attack
Question 9
0 / 2 pts
What is a characteristic of the constrained application protocol (CoAP)?
You Answered
It is primarily designed to collect data from many devices and deliver that data to
the IT infrastructure.
Correct Answer
It is mostly used for multiple clients where live data is the only data.
Question 10
0 / 2 pts
What is a characteristic of the message queueing telemetry transport (MQTT)
protocol?
You Answered
Correct Answer
The MQTT protocol requires a message broker.
Question 11
2 / 2 pts
How does UPnP assist a user to easily set up network-enabled devices?
It forces the devices to use UDP for all connections because of its lower overhead.
Correct!
Question 12
0 / 2 pts
For which type of devices is the use of DDS (data distribution service) in M2M
connections well suited?
You Answered
for devices that require a collection of data for centralized storage and filtration
Correct Answer
for devices that measure real-time data in microseconds that need to be filtered
and delivered efficiently
Question 13
2 / 2 pts
True or False?
On some home routers, to compromise the security on the router, a Flash applet
can be used to change the DNS server settings with an UPnP request.
Correct!
true
false
Question 14
2 / 2 pts
A client wants to deploy MQTT on a large enterprise network and is worried
about the security of MQTT. The client wants all messages encrypted, including
all messages between the broker and clients. What could the client do to achieve
this goal?
Use unique client IDs for each client.
Correct!
Question 15
2 / 2 pts
What is the safest way to prevent an XXE attack?
Correct!
Use SSL encryption on all traffic between the server and external clients.