CompTIA Exam Questions

Which of the following should be used to prevent unauthorized systems using ARP-based attacks to com

Devices on the SCADA network communicate exclusively at Layer 2. Which of the following
should be used to prevent unauthorized systems using ARP-based attacks to compromise the
SCADA network?

A.
Application firewall

B.
IPSec

C.
Hardware encryption

D.
VLANS

Explanation: