Which of the following should be used to prevent unauthorized systems using ARP-based attacks to compromise the SCADA network?

Devices on the SCADA network communicate exclusively at Layer 2. Which of the following should be
used to prevent unauthorized systems using ARP-based attacks to compromise the SCADA network?

Devices on the SCADA network communicate exclusively at Layer 2. Which of the following should be
used to prevent unauthorized systems using ARP-based attacks to compromise the SCADA network?

A.
Application firewall

B.
IPSec

C.
Hardware encryption

D.
VLANS



Leave a Reply 0

Your email address will not be published. Required fields are marked *

8 + three =