/
Comment 2
Comment 2
Preface, Page 2
3. Engage in ongoing threat assessment and risk analysis of the Root Server System and recommend any necessary [SW2] [audit]
[SW2] Audit is an extremely dangerous word here activity to assess the current status of root servers and the root zone.