Which of the following remediation strategies are MOST effective in reducing the risk of a
network-based compromise of embedded ICS? (Select two.)
A. Patching
B. NIDS
C. Segmentation
D. Disabling unused services
E. Firewalling
Explanation:
Which of the following remediation strategies are MOST effective in reducing the risk of a
network-based compromise of embedded ICS? (Select two.)
A. Patching
B. NIDS
C. Segmentation
D. Disabling unused services
E. Firewalling
Explanation:
You must be logged in to post a comment.