Which of the following remediation strategies are MOST …

Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)

Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)

A.
Patching

B.
NIDS

C.
Segmentation

D.
Disabling unused services

E.
Firewalling

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *