Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus ITS-110 Exam - Topic 1 Question 34 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 34
Topic #: 1
[All ITS-110 Questions]

A compromised IoT device is initiating random connections to an attacker's server in order to exfiltrate sensitive dat

a. Which type of attack is being used?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Hubert
5 months ago
SSL session hijack doesn’t really match the scenario, right?
upvoted 0 times
...
Tawny
5 months ago
I thought honeypots were just for trapping attackers, not this!
upvoted 0 times
...
Geraldine
5 months ago
Wait, are we sure it's not a MITM? Seems possible too.
upvoted 0 times
...
Norah
6 months ago
Totally agree, reverse shell fits the description.
upvoted 0 times
...
Jeanice
6 months ago
This sounds like a reverse shell attack.
upvoted 0 times
...
Freeman
6 months ago
Honeypots were mentioned in class, but I don’t think that fits here. This feels like a direct exfiltration method.
upvoted 0 times
...
Myra
6 months ago
I’m leaning towards the reverse shell option too, but I could be mixing it up with something else we studied.
upvoted 0 times
...
Lyda
6 months ago
I remember discussing man-in-the-middle attacks, but this scenario seems more about the device connecting to an attacker's server.
upvoted 0 times
...
Hannah
6 months ago
I think this might be a reverse shell attack, but I'm not entirely sure. It sounds familiar from our practice sessions.
upvoted 0 times
...
Shawnda
6 months ago
This is a tricky one. The random connections to the attacker's server make me think it could be a honeypot, but the data exfiltration part doesn't quite fit. I'm a bit confused on the best way to approach this, so I'll review my notes and try to eliminate the options that don't seem to match the scenario.
upvoted 0 times
...
Josue
6 months ago
Hmm, I'm a bit unsure about this one. The device is initiating random connections to an attacker's server, but I'm not sure which specific attack type that corresponds to. I'll have to think it through carefully.
upvoted 0 times
...
Crista
7 months ago
This seems like a straightforward question about network attacks. I'm pretty confident I can identify the type of attack being used here.
upvoted 0 times
...
Casie
7 months ago
Okay, let's see. The key details are that the IoT device is initiating connections to exfiltrate data, so it's likely some kind of remote access or data theft attack. I'm leaning towards either a man-in-the-middle or reverse shell, but I'll double-check the options to be sure.
upvoted 0 times
...
Aretha
7 months ago
I'm pretty confident that http is a core module, but the other options are throwing me off. I'll have to guess on the second one.
upvoted 0 times
...
Carri
7 months ago
I've got this one! The answer is D, carrier aggregation for 5G cells. In an Option 2 deployment, which is a 5G network, carrier aggregation is the most effective way to increase capacity by combining multiple 5G carriers. The other options, while valid in some scenarios, aren't as well-suited for this specific deployment.
upvoted 0 times
...
Frankie
11 months ago
If I had an IoT device, I'd name it 'Mr. Robot' just to mess with the hackers. They'd be so confused!
upvoted 0 times
...
Kassandra
11 months ago
I'm going with the man-in-the-middle attack. The IoT device is being tricked into sending data to the attacker's server.
upvoted 0 times
Pamela
10 months ago
I'm not sure, but it definitely sounds like a malicious attack on the IoT device.
upvoted 0 times
...
Franchesca
10 months ago
I think it could also be a reverse shell attack, where the attacker gains control of the IoT device.
upvoted 0 times
...
Cristina
11 months ago
I agree, it sounds like a man-in-the-middle attack.
upvoted 0 times
...
...
Billye
12 months ago
Nah, it's gotta be a honeypot! The attacker is just luring the IoT device into a trap, right?
upvoted 0 times
...
Cyril
12 months ago
Wait, I'm pretty sure it's an SSL session hijack. The attacker is intercepting the encrypted communication to steal the data.
upvoted 0 times
Danica
10 months ago
No, I believe it's more likely a reverse shell. The attacker is gaining control of the device to exfiltrate data.
upvoted 0 times
...
Elinore
10 months ago
But could it also be a reverse shell attack? The compromised device is connecting back to the attacker's server.
upvoted 0 times
...
Keneth
11 months ago
I think you're right, it does sound like an SSL session hijack.
upvoted 0 times
...
...
Freida
1 year ago
I think it's a reverse shell attack, where the compromised IoT device is giving the attacker remote access to the system.
upvoted 0 times
Nina
10 months ago
C: What about SSL session hijack?
upvoted 0 times
...
Aleisha
11 months ago
A: I don't think so, because in a man-in-the-middle attack, the attacker intercepts communication between two parties.
upvoted 0 times
...
Hillary
11 months ago
B: Could it also be a man-in-the-middle attack?
upvoted 0 times
...
Mindy
11 months ago
A: I agree, it sounds like a reverse shell attack.
upvoted 0 times
...
...
Meaghan
1 year ago
But wouldn't a Reverse shell make more sense in this scenario?
upvoted 0 times
...
Junita
1 year ago
I disagree, I believe it's a Man-in-the-middle attack.
upvoted 0 times
...
Meaghan
1 year ago
I think the attack being used is a Reverse shell.
upvoted 0 times
...

Save Cancel