Which three types of documents should be included when documenting the IoT system architecture using the Threat Model Analysis for an IoT System? (Choose three.)
- any possible impact on the reputation of the organization if the IoT system is attacked
- the financial risks of the various aspects of the IoT system
- the technologies, protocols, and standards used to implement the IoT system
- components of the IoT system at each layer
- the impact of privacy concerns as well as regulation requirements
- the flow of data between components and between layers
Explanation: During the step of documenting the IoT system architecture of the Threat Model Analysis for an IoT System, the documents created should include the following:
Components of the IoT system at each layer
The flow of data between components and between layers
The technologies, protocols, and standards used to implement the IoT system
Exam with this question: IoT Security 1.1 Chapter 2 Quiz Answers
Please login or Register to submit your answer