Thank you, Ms. Dabrusin.
The chair has one final question.
The last time you were here, Mr. Jones, you described the security approach as a kind of layering approach. You said that you had a certain openness with certain vendors where you could examine code and various things. When Professor Leuprecht was here, he talked about a system of switches and tables and the ever-evolving way in which that goes.
Are you still confident that the approach you are recommending, namely this layered approach, is as appropriate for a 5G network as it is for a 3G and possibly a 4G network?