A security administrator is reviewing logs and notices multiple attempts to access the HVAC controls by a workstation with an IP address from the open wireless network. Which of the following would be the best way to prevent this type of attack from occurring again?

A. Implement VLANs to separate the HVAC
B. Enable WPA2 security for the wireless network
C. Install a HIDS to protect the HVAC system
D. Enable Mac filtering for the wireless network


Answer: D. Enable Mac filtering for the wireless network

Computer Science & Information Technology

You might also like to view...

What is the critical path for this project? How do you know?

What will be an ideal response?

Computer Science & Information Technology

A storage device that contains some or all of the operating system is often called a(n) _____ because one can use it to start the computer if he or she has problems with the primary hard disk.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Use the ____________________ function when you want to find the position of an item in a range.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Memory management is intrinsically linked with device management when memory is used to buffer data between a very fast processor and slower secondary storage devices.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology