Which of the following would be MOST appropriate to secure an existing SCADA system by
preventing connections from unauthorized networks?
A.
Implement a HIDS to protect the SCADA system
B.
Implement a Layer 2 switch to access the SCADA system
C.
Implement a firewall to protect the SCADA system
D.
Implement a NIDS to protect the SCADA system