A small electronics company decides to use a contractor to assist with the development of a new FPGA-based device. Several of the development phases will occur off-site at the contractor's labs. Which of the following is the main concern a security analyst should have with this arrangement?

A. Making multiple trips between development sites increases the chance of physical damage to the FPGAs.
B. Moving the FPGAs between development sites will less the time that is available for security testing.
C. Development phases occurring at multiple sites may produce change management issues.
D. FPGA applications are easily cloned, increasing the possibility of intellectual property theft.

Answer: D. FPGA applications are easily cloned, increasing the possibility of intellectual property theft.

Computer Science & Information Technology

You might also like to view...

A ____________ is a data structure for holding elements.

a. Collection b. Iterator c. Vector d. Wildcard

Computer Science & Information Technology

To serve as a visual reminder that the structure or class name is not a variable, structure names and class names should ___________.

a. Begin with uppercase letters b. Begin with an underscore c. End with a letter d. all of the above

Computer Science & Information Technology