Devices on the SCADA network communicate exclusively at Layer 2. Which of the following should be
used to prevent unauthorized systems using ARP-based attacks to compromise the SCADA network?

A.
Application firewall
B.
IPSec
C.
Hardware encryption
D.
VLANS