Devices on the SCADA network communicate exclusively at Layer 2. Which of the following
should be used to prevent unauthorized systems using ARP-based attacks to compromise the
SCADA network?
A.
Application firewall
B.
IPSec
C.
Hardware encryption
D.
VLANS
Explanation: