Which of the following methods could the analyst use to…

A security analyst at a nuclear power plant needs to secure network traffic from the legacy SCADA systems. Which of the following methods could the analyst use
to secure network traffic in this static environment?

A security analyst at a nuclear power plant needs to secure network traffic from the legacy SCADA systems. Which of the following methods could the analyst use
to secure network traffic in this static environment?

A.
Implement a firewall

B.
Implement a HIDS

C.
Implement a NIDS

D.
Implement a rootjail



Leave a Reply 0

Your email address will not be published. Required fields are marked *

ten + eight =