Answer the following statements true (T) or false (F)
1. Systems must keep records of their activities to permit later forensic analysis to trace security breaches.
2. The attack surface is the reachable and exploitable vulnerabilities in a system.
3. The SDN controller is a high-value target that needs a high level of protection.
4. IoT is the newest, easiest, and most developed area of network security.
5. IoT must support security audit for data transmission, storage, processing, and application access.
1. TRUE
2. TRUE
3. TRUE
4. FALSE
5. TRUE
Computer Science & Information Technology