Devices on the SCADA network communicate exclusively at Layer 2. Which of the following should be used to prevent unauthorized systems using ARP-based
attacks to compromise the SCADA network?
A.
Application firewall
B.
IPSec
C.
Hardware encryption
D.
VLANS