Which of the following is a security concern with deploying COTS products within the network?

Which of the following is a security concern with deploying COTS products within the network?

Which of the following is a security concern with deploying COTS products within the network?

A.
It is difficult to verify the security of COTS code because the source is available to the customer
and it takes significant man hours to sort through it.

B.
COTS software often provides the source code as part of the licensing agreement and it
becomes the company’s responsibility to verify the security.

C.
It is difficult to verify the security of COTS code because the source is not available to the
customer in many cases.

D.
COTS source code is readily available to the customer in many cases which opens the
customer’s network to both internal and external attacks.



Leave a Reply 0

Your email address will not be published. Required fields are marked *