Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)
A.
Patching
B.
NIDS
C.
Segmentation
D.
Disabling unused services
E.
Firewalling
Explanation:
Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)
Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)
A.
Patching
B.
NIDS
C.
Segmentation
D.
Disabling unused services
E.
Firewalling
Explanation: