New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus ITS-110 Exam - Topic 1 Question 28 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 28
Topic #: 1
[All ITS-110 Questions]

An IoT security administrator wishes to mitigate the risk of falling victim to Distributed Denial of Service (DDoS) attacks. Which of the following mitigation strategies should the security administrator implement? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Galen
3 months ago
Wait, are we really suggesting honeypots? That feels sketchy.
upvoted 0 times
...
Fredric
3 months ago
Isn't blocking all TCP/UDP a bit extreme?
upvoted 0 times
...
Lynelle
4 months ago
Definitely go for X.509 certificates, they add a solid layer of security.
upvoted 0 times
...
Kristofer
4 months ago
I disagree, enabling unused ports for honeypots sounds risky.
upvoted 0 times
...
Deeanna
4 months ago
Blocking inbound packets with internal IPs is a must!
upvoted 0 times
...
Mira
4 months ago
Requiring X.509 certificates sounds like a solid strategy, but I’m not sure if it directly addresses DDoS attacks.
upvoted 0 times
...
Vernice
5 months ago
I feel like enabling unused TCP ports for a honeypot is risky; it might attract more attacks instead of mitigating them.
upvoted 0 times
...
Derrick
5 months ago
I think blocking all inbound packets from service ports could help, but I’m not confident about the specifics.
upvoted 0 times
...
Kelvin
5 months ago
I remember we discussed blocking inbound packets with internal source IPs in class, but I'm not sure if that's the best option here.
upvoted 0 times
...
Earlean
5 months ago
Requiring digital certificates could add an extra layer of security, but might not be the primary focus for DDoS mitigation.
upvoted 0 times
...
Terrilyn
5 months ago
Enabling a honeypot could be an interesting approach, but I'm not sure if that's the most effective DDoS mitigation strategy here.
upvoted 0 times
...
Refugia
5 months ago
Hmm, blocking internal source IPs and service ports seem like good options to consider. I'll have to weigh the pros and cons of each.
upvoted 0 times
...
William
5 months ago
This looks like a tricky DDoS mitigation question. I'll need to think carefully about the best strategies to implement.
upvoted 0 times
...
Goldie
5 months ago
Blocking TCP and UDP traffic entirely seems a bit extreme. I'll need to find a more balanced solution.
upvoted 0 times
...
Luz
5 months ago
I've got this! The data summary button is clearly showing Hosts, Sourcetypes, and Sources, so those are the three I'll choose.
upvoted 0 times
...
India
5 months ago
I'm a bit confused on the differences between the Storage Space options. I'll need to review the details of each one to determine the best fit.
upvoted 0 times
...
Ashley
5 months ago
I think this is asking about the different stages of the website development process. I'm pretty confident I know the "five Ds" - Discover, Define, Design, Develop, and Deploy. So I'll carefully consider each option and try to identify which one matches the current stage of creating a site map.
upvoted 0 times
...
Rickie
5 months ago
This one seems pretty straightforward. I'm pretty sure the answer is D, the VETS-100 form.
upvoted 0 times
...
France
5 months ago
I'm a bit confused by this question. I'm not sure what kind of "repressive measure" would be taken after a fire. I'll have to read the options carefully.
upvoted 0 times
...
Dorothy
10 months ago
I'm just waiting for the option that says 'Pour maple syrup on your server and hope the DDoS bots get stuck.' That's the kind of outside-the-box thinking I'm looking for.
upvoted 0 times
Lili
8 months ago
B) Block all inbound packets originating from service ports
upvoted 0 times
...
Belen
9 months ago
A) Block all inbound packets with an internal source IP address
upvoted 0 times
...
...
Man
10 months ago
Requiring X.509 digital certificates for all incoming requests? Now we're talking! That's a solid way to authenticate legitimate traffic and weed out the DDoS nonsense.
upvoted 0 times
...
Yuriko
10 months ago
Blocking TCP and UDP through the firewall? Might as well just unplug the internet and call it a day. That's about as effective as trying to stop a fire with a garden hose.
upvoted 0 times
Elroy
9 months ago
User 3: We should focus on other mitigation strategies instead.
upvoted 0 times
...
Britt
9 months ago
User 2: Agreed, it's like trying to stop a fire with a garden hose.
upvoted 0 times
...
Andra
9 months ago
User 1: Blocking TCP and UDP through the firewall is not a good idea.
upvoted 0 times
...
...
Meghan
10 months ago
Enabling unused TCP service ports to create a honeypot? Sounds like a great way to get your server swarmed with bots. I'll pass on that one, thanks.
upvoted 0 times
Kirk
9 months ago
User 3: Blocking inbound packets with internal source IP addresses seems like a safer option.
upvoted 0 times
...
Ilene
9 months ago
User 2: Definitely, I wouldn't want to attract more attacks.
upvoted 0 times
...
Paz
10 months ago
User 1: I agree, creating a honeypot seems risky.
upvoted 0 times
...
...
Brynn
10 months ago
Blocking all inbound packets with an internal source IP address? That's like putting a padlock on your front door and leaving the back door wide open. Not a very effective DDoS mitigation strategy if you ask me.
upvoted 0 times
Graciela
9 months ago
B) Block all inbound packets originating from service ports
upvoted 0 times
...
Glory
9 months ago
A) Block all inbound packets with an internal source IP address
upvoted 0 times
...
...
Kayleigh
11 months ago
But we should also require the use of X.509 digital certificates for all incoming requests. That way we can verify the authenticity of the requests.
upvoted 0 times
...
Keshia
11 months ago
I agree with Marilynn. That would help prevent DDoS attacks.
upvoted 0 times
...
Marilynn
11 months ago
I think we should block all inbound packets with an internal source IP address.
upvoted 0 times
...

Save Cancel