New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus ITS-110 Exam - Topic 1 Question 34 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 34
Topic #: 1
[All ITS-110 Questions]

A compromised IoT device is initiating random connections to an attacker's server in order to exfiltrate sensitive dat

a. Which type of attack is being used?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Hubert
3 months ago
SSL session hijack doesn’t really match the scenario, right?
upvoted 0 times
...
Tawny
3 months ago
I thought honeypots were just for trapping attackers, not this!
upvoted 0 times
...
Geraldine
4 months ago
Wait, are we sure it's not a MITM? Seems possible too.
upvoted 0 times
...
Norah
4 months ago
Totally agree, reverse shell fits the description.
upvoted 0 times
...
Jeanice
4 months ago
This sounds like a reverse shell attack.
upvoted 0 times
...
Freeman
4 months ago
Honeypots were mentioned in class, but I don’t think that fits here. This feels like a direct exfiltration method.
upvoted 0 times
...
Myra
5 months ago
I’m leaning towards the reverse shell option too, but I could be mixing it up with something else we studied.
upvoted 0 times
...
Lyda
5 months ago
I remember discussing man-in-the-middle attacks, but this scenario seems more about the device connecting to an attacker's server.
upvoted 0 times
...
Hannah
5 months ago
I think this might be a reverse shell attack, but I'm not entirely sure. It sounds familiar from our practice sessions.
upvoted 0 times
...
Shawnda
5 months ago
This is a tricky one. The random connections to the attacker's server make me think it could be a honeypot, but the data exfiltration part doesn't quite fit. I'm a bit confused on the best way to approach this, so I'll review my notes and try to eliminate the options that don't seem to match the scenario.
upvoted 0 times
...
Josue
5 months ago
Hmm, I'm a bit unsure about this one. The device is initiating random connections to an attacker's server, but I'm not sure which specific attack type that corresponds to. I'll have to think it through carefully.
upvoted 0 times
...
Crista
5 months ago
This seems like a straightforward question about network attacks. I'm pretty confident I can identify the type of attack being used here.
upvoted 0 times
...
Casie
5 months ago
Okay, let's see. The key details are that the IoT device is initiating connections to exfiltrate data, so it's likely some kind of remote access or data theft attack. I'm leaning towards either a man-in-the-middle or reverse shell, but I'll double-check the options to be sure.
upvoted 0 times
...
Aretha
5 months ago
I'm pretty confident that http is a core module, but the other options are throwing me off. I'll have to guess on the second one.
upvoted 0 times
...
Carri
5 months ago
I've got this one! The answer is D, carrier aggregation for 5G cells. In an Option 2 deployment, which is a 5G network, carrier aggregation is the most effective way to increase capacity by combining multiple 5G carriers. The other options, while valid in some scenarios, aren't as well-suited for this specific deployment.
upvoted 0 times
...
Frankie
10 months ago
If I had an IoT device, I'd name it 'Mr. Robot' just to mess with the hackers. They'd be so confused!
upvoted 0 times
...
Kassandra
10 months ago
I'm going with the man-in-the-middle attack. The IoT device is being tricked into sending data to the attacker's server.
upvoted 0 times
Pamela
8 months ago
I'm not sure, but it definitely sounds like a malicious attack on the IoT device.
upvoted 0 times
...
Franchesca
8 months ago
I think it could also be a reverse shell attack, where the attacker gains control of the IoT device.
upvoted 0 times
...
Cristina
9 months ago
I agree, it sounds like a man-in-the-middle attack.
upvoted 0 times
...
...
Billye
10 months ago
Nah, it's gotta be a honeypot! The attacker is just luring the IoT device into a trap, right?
upvoted 0 times
...
Cyril
10 months ago
Wait, I'm pretty sure it's an SSL session hijack. The attacker is intercepting the encrypted communication to steal the data.
upvoted 0 times
Danica
9 months ago
No, I believe it's more likely a reverse shell. The attacker is gaining control of the device to exfiltrate data.
upvoted 0 times
...
Elinore
9 months ago
But could it also be a reverse shell attack? The compromised device is connecting back to the attacker's server.
upvoted 0 times
...
Keneth
9 months ago
I think you're right, it does sound like an SSL session hijack.
upvoted 0 times
...
...
Freida
10 months ago
I think it's a reverse shell attack, where the compromised IoT device is giving the attacker remote access to the system.
upvoted 0 times
Nina
9 months ago
C: What about SSL session hijack?
upvoted 0 times
...
Aleisha
9 months ago
A: I don't think so, because in a man-in-the-middle attack, the attacker intercepts communication between two parties.
upvoted 0 times
...
Hillary
9 months ago
B: Could it also be a man-in-the-middle attack?
upvoted 0 times
...
Mindy
10 months ago
A: I agree, it sounds like a reverse shell attack.
upvoted 0 times
...
...
Meaghan
11 months ago
But wouldn't a Reverse shell make more sense in this scenario?
upvoted 0 times
...
Junita
11 months ago
I disagree, I believe it's a Man-in-the-middle attack.
upvoted 0 times
...
Meaghan
11 months ago
I think the attack being used is a Reverse shell.
upvoted 0 times
...

Save Cancel