Devices on the SCADA network communicate exclusively at Layer 2. Which of the following should be used to
prevent unauthorized systems using ARP-based attacks to compromise the SCADA network?
A.
Application firewall
B.
IPSec
C.
Hardware encryption
D.
VLANS
Correct answer is D.