Which of the following methods can the analyst use to s…

A security analyst at a nuclear power plant needs to secure network traffic from the legacy SCADA systems. Which of the following methods can the analyst use to
secure network in this static environment?

A security analyst at a nuclear power plant needs to secure network traffic from the legacy SCADA systems. Which of the following methods can the analyst use to
secure network in this static environment?

A.
Implement a firewall

B.
Implement a HIDS

C.
Implement a NIDS

D.
Implement a rootjail



Leave a Reply 0

Your email address will not be published. Required fields are marked *

three × three =