which of the following techniques supports availability?

When considering a vendor-specific vulnerability in critical industrial control systems which of the
following techniques supports availability?

When considering a vendor-specific vulnerability in critical industrial control systems which of the
following techniques supports availability?

A.
Deploying identical application firewalls at the border

B.
Incorporating diversity into redundant design

C.
Enforcing application white lists on the support workstations

D.
Ensuring the systems’ anti-virus definitions are up-to-date

Explanation:



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Anon

Anon

Incorporating diversity into redundant design