Answer the following statements true (T) or false (F)
1. Systems must keep records of their activities to permit later forensic analysis to trace security breaches.
2. The attack surface is the reachable and exploitable vulnerabilities in a system.
3. The SDN controller is a high-value target that needs a high level of protection.
4. IoT is the newest, easiest, and most developed area of network security.
5. IoT must support security audit for data transmission, storage, processing, and application access.
1. TRUE
2. TRUE
3. TRUE
4. FALSE
5. TRUE
You might also like to view...
Copy text by using the copy button on the Ribbon, the Ctrl + C shortcut, or by right-clicking a selection and then selecting Copy from the ________ menu
A) Paste Options B) keyboard C) insert D) shortcut
To select a range in Excel, click the first cell in the proposed range and then drag the pointer to the last cell in the range.
Answer the following statement true (T) or false (F)
To select a startup form, click Options in the Backstage view to display the Access Options dialog box, and then click ____.
A. Popular B. Current Database C. Object Designers D. Customize
Match each item with a statement below:
A. A template, or blueprint, that serves as the basis for new objects B. Creates aDateobject containing the current date C. Elements required for a source program to communicate with an object D. Converts a number to a string using the number of decimal places specified E. Returns the square root of the specified value F. Programming code and data that can be treated as an individual unit or component G. The easiest way to declare a custom object H. Type of array that enables you to add object properties incorporating numbers I. Returns a value rounded to the nearest integer J. ?A function assigned a name within a custom object