What is one popular network protocol that is usually enabled by default on home routers that creates a large attack surface?

What is one popular network protocol that is usually enabled by default on home routers that creates a large attack surface?
A . Open virtual private network (VPN)
B. Universal Plug and Play (UPnP)
C. Network Address Translation (NAT)
D. Domain Name System Security Extensions (DNSSEC)

Answer: B

Explanation:

Reference: https://phoenixnap.com/blog/what-is-upnp

If a site administrator wants to improve the secure access to a cloud portal, which of the following would be the BEST countermeasure to implement?

If a site administrator wants to improve the secure access to a cloud portal, which of the following would be the BEST countermeasure to implement?
A . Require frequent password changes
B. Mandate multi-factor authentication (MFA)
C. Utilize role-based access control (RBAC)
D. Require separation of duties

Answer: C

Which of the following tools or techniques should he utilize?

A software developer for an IoT device company is creating software to enhance the capabilities of his company’s security cameras. He wants the end users to be confident that the software they are downloading from his company’s support site is legitimate.

Which of the following tools or techniques should he utilize?
A . Data validation
B. Interrupt analyzer
C. Digital certificate
D. Pseudocode

Answer: C

According to the General Data Protection Regulation (GDPR), when is an organization required to delete this data?

A user grants an IoT manufacturer consent to store personally identifiable information (PII).

According to the General Data Protection Regulation (GDPR), when is an organization required to delete this data?
A . Within ninety days after collection, unless required for a legal proceeding
B. Within thirty days of a user’s written request
C. Within seven days of being transferred to secure, long-term storage
D. Within sixty days after collection, unless encrypted

Answer: B