which of the following techniques supports availability?

When considering a vendor-specific vulnerability in critical industrial control systems which of the
following techniques supports availability?

When considering a vendor-specific vulnerability in critical industrial control systems which of the
following techniques supports availability?

A.
Deploying identical application firewalls at the border

B.
Incorporating diversity into redundant design

C.
Enforcing application white lists on the support workstations

D.
Ensuring the systems’ anti-virus definitions are up-to-date



Leave a Reply 0

Your email address will not be published. Required fields are marked *