List of questions
Related questions
Question 4 - 212-82 discussion
Hayes, a security professional, was tasked with the implementation of security controls for an industrial network at the Purdue level 3.5 (IDMZ). Hayes verified all the possible attack vectors on the IDMZ level and deployed a security control that fortifies the IDMZ against cyber-attacks.
Identify the security control implemented by Hayes in the above scenario.
A.
Point-to-po int communication
B.
MAC authentication
C.
Anti-DoS solution
D.
Use of authorized RTU and PLC commands
Your answer:
0 comments
Sorted by
Leave a comment first