PdfPrep.com

Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)

Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)
A . Patching
B . NIDS
C . Segmentation
D . Disabling unused services
E . Firewalling

Answer: CD

Exit mobile version