Which of the following BEST describes the rationale behind this architecture?

A security administrator must implement a SCADA style network overlay to ensure secure remote
management of all network management and infrastructure devices. Which of the following BEST
describes the rationale behind this architecture?

A security administrator must implement a SCADA style network overlay to ensure secure remote
management of all network management and infrastructure devices. Which of the following BEST
describes the rationale behind this architecture?

A.
A physically isolated network that allows for secure metric collection.

B.
A physically isolated network with inband management that uses two factor authentication.

C.
A logically isolated network with inband management that uses secure two factor
authentication.

D.
An isolated network that provides secure out-of-band remote management.



Leave a Reply 0

Your email address will not be published. Required fields are marked *