Ssis-976 4k Access
Section E — Security & Compliance (10 points) 14. (5 pts) List five configuration or operational controls to secure the SSIS-976 4K against unauthorized access. For each control provide one sentence describing how it reduces risk. 15. (5 pts) Describe an incident response checklist if the device is suspected of compromise (brief, ordered steps: detection, containment, analysis, eradication, recovery, post-incident review).