Devices on the SCADA network communicate exclusively at Layer 2. Which of the following should be used to
prevent unauthorized systems using ARP-based attacks to compromise the SCADA network?

A.
Application firewall
B.
IPSec
C.
Hardware encryption
D.
VLANS
Correct answer is D.
1
0
Yes, VLANS operate at layer 2 of the OSI model. D
0
0