Which three types of documents should be included when documenting the IoT system architecture using the Threat Model Analysis for an IoT System? (Choose three.)

IT Questions BankCategory: IoT SecurityWhich three types of documents should be included when documenting the IoT system architecture using the Threat Model Analysis for an IoT System? (Choose three.)

Which three types of documents should be included when documenting the IoT system architecture using the Threat Model Analysis for an IoT System? (Choose three.)

  • any possible impact on the reputation of the organization if the IoT system is attacked
  • the financial risks of the various aspects of the IoT system
  • the technologies, protocols, and standards used to implement the IoT system
  • components of the IoT system at each layer
  • the impact of privacy concerns as well as regulation requirements
  • the flow of data between components and between layers

Explanation: During the step of documenting the IoT system architecture of the Threat Model Analysis for an IoT System, the documents created should include the following:

Components of the IoT system at each layer
The flow of data between components and between layers
The technologies, protocols, and standards used to implement the IoT system

Exam with this question: IoT Security 1.1 Chapter 2 Quiz Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments