Which of the following should be used to prevent unauth…

Devices on the SCADA network communicate exclusively at Layer 2. Which of the following should be used to
prevent unauthorized systems using ARP-based attacks to compromise the SCADA network?

Devices on the SCADA network communicate exclusively at Layer 2. Which of the following should be used to
prevent unauthorized systems using ARP-based attacks to compromise the SCADA network?

A.
Application firewall

B.
IPSec

C.
Hardware encryption

D.
VLANS



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Dominus

Dominus

Correct answer is D.