Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam ITS-110 Topic 1 Question 13 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 13
Topic #: 1
[All ITS-110 Questions]

An IoT security architect needs to secure data in motion. Which of the following is a common vulnerability used to exploit unsecure data in motion?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Paola
1 months ago
Ha! External flash access? Really? What is this, the 90s? Nah, man, it's all about that SSL/TLS these days. Gotta keep those hackers out of your IoT data, am I right?
upvoted 0 times
Margurite
5 days ago
Definitely, SSL/TLS is the way to go for securing data in motion.
upvoted 0 times
...
Lavonna
6 days ago
Yeah, external flash access is so outdated.
upvoted 0 times
...
...
Dell
1 months ago
Well, at least it's not the lack of memory space isolation. That would just be such a rookie mistake, you know? I'm going with the SSL/TLS option, gotta keep that data secure in motion.
upvoted 0 times
...
Tiffiny
1 months ago
Hmm, I'm not so sure. Could it be the databases and datastores? I've heard those can be a real weak point in IoT security. But then again, the SSL/TLS option does sound pretty risky.
upvoted 0 times
Rosalyn
16 days ago
User 3: Lack of memory space isolation can also lead to data in motion being exploited.
upvoted 0 times
...
Lonny
17 days ago
User 2: Yeah, that's true. But misconfigured SSL/TLS can also be a big risk.
upvoted 0 times
...
Elouise
25 days ago
User 1: I think databases and datastores are a common vulnerability for unsecure data in motion.
upvoted 0 times
...
...
Arminda
2 months ago
Oh, this one's easy! Definitely the misconfigured SSL/TLS. I mean, come on, who doesn't know that's a common vulnerability these days?
upvoted 0 times
Jordan
1 months ago
User 4: It's such a basic security measure, but so many overlook it.
upvoted 0 times
...
Brandon
1 months ago
User 3: I always make sure to double check SSL/TLS settings.
upvoted 0 times
...
Tenesha
2 months ago
User 2: Yeah, that's a big one. It's so common.
upvoted 0 times
...
Azalee
2 months ago
User 1: Definitely the misconfigured SSL/TLS.
upvoted 0 times
...
...
Thaddeus
2 months ago
I'm not sure, but I think D) Lack of memory space isolation could also be a vulnerability for data in motion.
upvoted 0 times
...
Junita
2 months ago
I agree with Kanisha. Misconfigured SSL/TLS can definitely lead to data in motion being exploited.
upvoted 0 times
...
Kanisha
3 months ago
I think the answer is B) Misconfigured Secure Sockets Layer (SSL)/Transport Layer Security (TLS).
upvoted 0 times
...

Save Cancel
a