Answer the following statements true (T) or false (F)

1. Systems must keep records of their activities to permit later forensic analysis to trace security breaches.
2. The attack surface is the reachable and exploitable vulnerabilities in a system.
3. The SDN controller is a high-value target that needs a high level of protection.
4. IoT is the newest, easiest, and most developed area of network security.
5. IoT must support security audit for data transmission, storage, processing, and application access.

1. TRUE
2. TRUE
3. TRUE
4. FALSE
5. TRUE

Computer Science & Information Technology

You might also like to view...

Which of the following are digital audio-only formats? (Select TWO).

A. AAC B. WMV C. WMA D. AVI E. DES

Computer Science & Information Technology

List and explain the three main sources of transmission errors.

What will be an ideal response?

Computer Science & Information Technology