A security administrator must implement a SCADA style network overlay to ensure secure remote
management of all network management and infrastructure devices. Which of the following BEST
describes the rationale behind this architecture?
A.
A physically isolated network that allows for secure metric collection.
B.
A physically isolated network with inband management that uses two factor authentication.
C.
A logically isolated network with inband management that uses secure two factor
authentication.
D.
An isolated network that provides secure out-of-band remote management.