Which of the following should be used to prevent unauthorized systems using ARP-based attacks to compromise the SCADA network?

Devices on the SCADA network communicate exclusively at Layer 2. Which of the following
should be used to prevent unauthorized systems using ARP-based attacks to compromise the
SCADA network?

Devices on the SCADA network communicate exclusively at Layer 2. Which of the following
should be used to prevent unauthorized systems using ARP-based attacks to compromise the
SCADA network?

A.
Application firewall

B.
IPSec

C.
Hardware encryption

D.
VLANS

Explanation:



Leave a Reply to Lake Cancel reply2

Your email address will not be published. Required fields are marked *

6 + 7 =


Lake

Lake

In other words, this question is asking you what choice is running on layer 2?
A. Application firewall – Layer 7
B. IPSec- Layer 3
C. Hardware encryption- Layer 1
D. VLANS- Layer 2
The correct answer is D. In fact, you can assign SCADA network into a separate VLAN.

https://www.quora.com/What-OSI-layer-does-IPSec-work-on

Paul S

Paul S

Agreed. Definitely D. Good explanation.