All Practice Exams

100+ Free CIoTSP Practice Questions

Pass your CertNexus Certified Internet of Things Security Practitioner (CIoTSP) exam on the first try — instant access, no signup required.

✓ No registration✓ No credit card✓ No hidden fees✓ Start practicing immediately
Not published Pass Rate
100+ Questions
100% Free
1 / 10
Question 1
Score: 0/0

Which of the following best describes 'secure boot' on an IoT device?

A
B
C
D
to track
2026 Statistics

Key Facts: CIoTSP Exam

100

Exam Questions

CertNexus

120 min

Exam Duration

CertNexus

60-66%

Passing Score

CertNexus

$250

Exam Fee

CertNexus

3 years

Valid For

CertNexus

Vendor-neutral

Cert Type

CertNexus

The CIoTSP exam (ITS-110) has 100 multiple-choice questions in 120 minutes with a passing score of approximately 60-66%. It is delivered at Pearson VUE test centers and via online proctoring. The certification costs $250 USD and is valid for 3 years. CIoTSP is vendor-neutral — content covers securing devices (secure boot, TPM, code signing), networks (DTLS, mutual TLS, VLAN segmentation, WPA3, EAP-TLS), data (AES-GCM, ECDSA, KMS/HSM, PII, GDPR, HIPAA), cloud (IAM least privilege, MFA, secrets management, audit logging), and applications (OWASP IoT Top 10, secure SDLC, SAST/DAST). Frameworks covered include NIST IR 8259, ETSI EN 303 645, EU CRA, US IoT Cybersecurity Improvement Act, and California SB-327.

Sample CIoTSP Practice Questions

Try these sample questions to test your CIoTSP exam readiness. Each question includes a detailed explanation. Start the interactive quiz above for the full 100+ question experience with AI tutoring.

1Which of the following best describes 'secure boot' on an IoT device?
A.A boot mode that disables the network
B.A process where each stage of the boot chain cryptographically verifies the next image's signature against a trusted public key before executing it
C.A firmware that boots only when a USB key is present
D.A method to make the device boot faster
Explanation: Secure boot establishes a chain of trust starting in immutable ROM: the bootloader verifies the next stage's signature using a public key fused into the SoC, that stage verifies the next, and so on up to the application. This blocks an attacker who has flash-write access from running tampered firmware. It does not by itself manage networks or USB.
2What is the role of a hardware Root of Trust (RoT) in an IoT device?
A.A wireless antenna
B.An immutable, tamper-resistant cryptographic anchor (often in silicon) used to verify firmware, store keys, and bootstrap higher-level security
C.A manual reset switch
D.An optional Bluetooth profile
Explanation: A hardware Root of Trust — typically an immutable boot ROM, fused public key, and a secure element or TPM — is the trusted anchor on top of which secure boot, signed firmware verification, and key storage are built. Without a hardware RoT, every higher-level security claim can be undermined by tampering with software-only protections.
3Which standard addresses baseline cybersecurity for consumer IoT devices in the EU and is widely referenced internationally?
A.NIST SP 800-53
B.ETSI EN 303 645
C.ISO 9001
D.PCI DSS
Explanation: ETSI EN 303 645 is the European baseline for consumer IoT cybersecurity, with provisions like no universal default passwords, vulnerability disclosure, secure update, and minimization of attack surface. It is the basis for the UK PSTI Act regulations and influences other national rules. NIST 800-53 is for federal information systems; ISO 9001 is quality; PCI DSS is for cardholder data.
4What is the primary requirement of the U.S. IoT Cybersecurity Improvement Act of 2020?
A.It bans IoT devices from the U.S. market
B.It requires NIST to develop standards and guidelines for federal procurement of IoT devices and OMB to enforce them
C.It mandates a single password for all IoT devices
D.It exempts federal agencies from any IoT security requirements
Explanation: The IoT Cybersecurity Improvement Act of 2020 directs NIST to develop standards (NIST IR 8259 series, SP 800-213) for IoT devices used by the federal government and requires agencies to comply when procuring such devices. It does not ban consumer IoT or mandate a single password.
5Which California law requires IoT manufacturers to ship devices with reasonable security features and prohibits universal default passwords?
A.CCPA
B.SB-327
C.CalOPPA
D.Proposition 24
Explanation: California SB-327, effective January 1, 2020, requires connected device manufacturers to equip devices with 'reasonable security features' and prohibits universal default passwords — devices must either ship with a unique preprogrammed password or require the user to set a new one on first use. CCPA and Prop 24 (CPRA) cover consumer privacy more broadly.
6Which threat-modeling methodology categorizes threats as Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of privilege?
A.DREAD
B.PASTA
C.STRIDE
D.OCTAVE
Explanation: STRIDE, developed at Microsoft, classifies threats into Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of privilege. It is widely applied in IoT threat modeling to systematically reason about attacks on device, gateway, network, cloud, and app components.
7Which of the following is a primary objective when applying defense-in-depth to an IoT solution?
A.Rely on a single perimeter firewall
B.Layer multiple, independent controls (device hardening, network segmentation, identity, encryption, monitoring) so that a single failure does not compromise the system
C.Disable all logging to save bandwidth
D.Use only physical security
Explanation: Defense-in-depth assumes any single control will eventually fail; layering independent controls — hardware Root of Trust, signed firmware, segmented network, mutual TLS, IAM, monitoring — ensures one failure does not collapse the entire system. Single perimeter defenses are widely criticized as brittle and explicitly discouraged by every modern IoT security framework.
8Which protocol secures CoAP communications?
A.TLS over TCP
B.DTLS over UDP
C.SSH
D.IPsec only
Explanation: CoAP runs over UDP, so it uses DTLS (Datagram TLS) to provide confidentiality, integrity, and authentication. DTLS adapts TLS to datagram transports while preserving its cryptographic guarantees. Standard TLS is not used because TLS requires a reliable byte stream like TCP.
9What is mutual TLS (mTLS) in an MQTT IoT context?
A.TLS where only the server authenticates with a certificate
B.TLS where both the device and the broker authenticate each other using X.509 certificates
C.TLS without encryption
D.TLS run only on the LAN
Explanation: Mutual TLS requires both endpoints to present and validate X.509 certificates. In an IoT deployment, the broker presents its server cert and the device presents a unique client cert. mTLS is the recommended way to authenticate IoT devices because it avoids shared secrets and supports per-device identity and revocation.
10Which TLS version is the modern recommended baseline, with older versions deprecated by IETF and many regulators?
A.SSL 3.0
B.TLS 1.0
C.TLS 1.1
D.TLS 1.3
Explanation: TLS 1.3 (RFC 8446, 2018) is the modern baseline. SSL 3.0, TLS 1.0, and TLS 1.1 are deprecated by IETF (RFC 8996) and disabled by major browsers and cloud platforms. New IoT designs should require TLS 1.2 at minimum and prefer TLS 1.3.

About the CIoTSP Exam

The CertNexus Certified Internet of Things Security Practitioner (CIoTSP, ITS-110) is a vendor-neutral IoT security certification. It validates skills in securing IoT devices (secure boot, hardware Root of Trust, firmware signing), securing IoT networks (TLS/DTLS, mTLS, segmentation, WPA3, IDS/IPS), securing IoT data (encryption at rest/in transit, key management, PII), securing the cloud (IAM, MFA, audit logging, secrets management), and securing IoT applications (OWASP IoT Top 10, secure SDLC, SAST/DAST, fuzzing).

Questions

100 scored questions

Time Limit

120 minutes

Passing Score

60-66%

Exam Fee

$250 USD (CertNexus / Pearson VUE)

CIoTSP Exam Content Outline

20-25%

Securing IoT Devices

Secure boot, hardware Root of Trust, TPM/secure element, signed firmware, OTA security with rollback, debug-port disablement, side-channel attack awareness, attack surface reduction

20-25%

Securing IoT Networks

TLS 1.2/1.3, DTLS for CoAP, mutual TLS with X.509, WPA3 (SAE, OWE), 802.1X with EAP-TLS, PMF, VLAN segmentation, IDS/IPS for IoT/OT (Modbus, MQTT, BACnet, OPC UA), MQTT topic ACLs

15-20%

Securing IoT Data

AES-GCM, ChaCha20-Poly1305, ECDSA, key management with KMS/HSM, data minimization, PII handling, GDPR Article 5/35, CCPA/CPRA, HIPAA basics, encryption at rest/in transit, crypto-agility

15-20%

Securing IoT Cloud

IAM least privilege, per-device IoT policies (e.g., AWS IoT policy variables), MFA (FIDO2/WebAuthn), secrets management (Vault, Key Vault, Secrets Manager), audit logging, third-party risk

15-20%

Securing IoT Applications and Lifecycle

OWASP IoT Top 10, secure SDLC, SAST/DAST/SCA, fuzzing, threat modeling (STRIDE), incident response, vulnerability disclosure, SBOMs, frameworks (NIST IR 8259, ETSI EN 303 645, EU Cyber Resilience Act, US IoT Cybersecurity Improvement Act, CA SB-327)

How to Pass the CIoTSP Exam

What You Need to Know

  • Passing score: 60-66%
  • Exam length: 100 questions
  • Time limit: 120 minutes
  • Exam fee: $250 USD

Keys to Passing

  • Complete 500+ practice questions
  • Score 80%+ consistently before scheduling
  • Focus on highest-weighted sections
  • Use our AI tutor for tough concepts

CIoTSP Study Tips from Top Performers

1Master TLS 1.3 and DTLS, including mutual TLS with X.509 client certificates and certificate pinning
2Know the OWASP IoT Top 10 (2018) — especially I1 (weak/default passwords), I4 (lack of secure update mechanism), and I7 (insecure data transfer/storage)
3Study secure boot and signed firmware — chain of trust from immutable ROM, code signing, rollback protection
4Understand ETSI EN 303 645 baseline provisions and how they map to NIST IR 8259A core capabilities
5Learn the EU Cyber Resilience Act timeline (adopted 2024, full effect 2027) and its requirements: security by design, vulnerability handling, SBOMs, mandatory incident reporting
6Review key US laws: IoT Cybersecurity Improvement Act of 2020 and California SB-327 (no universal default passwords)
7Know STRIDE threat modeling and how to apply it across device/network/cloud/application layers

Frequently Asked Questions

What is the CertNexus CIoTSP exam?

The Certified Internet of Things Security Practitioner (ITS-110) is a vendor-neutral IoT security certification from CertNexus. It covers securing IoT devices, networks, data, cloud, and applications, plus threat modeling, incident response, and frameworks/regulations like NIST IR 8259, ETSI EN 303 645, the EU Cyber Resilience Act, and California SB-327. The exam has 100 questions in 120 minutes.

How hard is the CIoTSP exam?

CIoTSP is moderate-to-challenging for a security practitioner. Candidates with general security backgrounds (Security+, CISSP) plus IoT exposure typically pass with 50-70 hours of preparation. The exam expects working knowledge of cryptography (AES, ECDSA, TLS), device hardening (secure boot, TPM, signed firmware), and IoT-specific frameworks like ETSI EN 303 645 and the EU CRA.

How much does the CIoTSP exam cost and how long is the certification valid?

The CIoTSP exam fee is $250 USD. The certification is valid for 3 years and can be renewed via continuing professional education or by re-taking the exam. The exam is delivered through Pearson VUE at test centers or via online proctoring.

Should I take CIoTP or CIoTSP first?

If you are new to IoT, CIoTP first gives you the architecture, protocol, and platform foundation. If you already work in IoT and have a security background, CIoTSP is the natural next step and stands alone. Many practitioners hold both as complementary credentials covering general IoT and IoT-specific security.

Is CIoTSP recognized by IoT regulations like the EU CRA?

CIoTSP itself is a personal credential, not a product certification. However, its curriculum directly maps to topics required by the EU Cyber Resilience Act, the US IoT Cybersecurity Improvement Act, California SB-327, ETSI EN 303 645, and the NIST IR 8259 series — making it a useful credential for engineers building products that must comply with these regulations.