Which of the following should be used to prevent unauth…

Devices on the SCADA network communicate exclusively at Layer 2. Which of the following should be used to prevent unauthorized systems using ARP-based
attacks to compromise the SCADA network?

Devices on the SCADA network communicate exclusively at Layer 2. Which of the following should be used to prevent unauthorized systems using ARP-based
attacks to compromise the SCADA network?

A.
Application firewall

B.
IPSec

C.
Hardware encryption

D.
VLANS



Leave a Reply 0

Your email address will not be published. Required fields are marked *

nineteen − five =