During a recent investigation, an auditor discovered that an engineer's compromised workstation was being used to connect to SCADA systems while the engineer was not logged in. The engineer is responsible for administering the SCADA systems and cannot be blocked from connecting to them. The SCADA systems cannot be modified without vendor approval which requires months of testing. Which of the following is MOST likely to protect the SCADA systems from misuse?

A. Update anti-virus definitions on SCADA systems
B. Audit accounts on the SCADA systems
C. Install a firewall on the SCADA network
D. Deploy NIPS at the edge of the SCADA network


Answer: D. Deploy NIPS at the edge of the SCADA network

Computer Science & Information Technology

You might also like to view...

____ are meant to optimize the cost/risk factors for information that would be lost.

A. Checkpoints B. Restore points C. Recovery points D. Backup points

Computer Science & Information Technology

The simplest type of support that the operating system can provide is _________

A) ?overflow buffering ? B) ?dual buffering C) ?single buffering ? D) ?circular buffering

Computer Science & Information Technology

A(n) __________ is an electronic signal that results in the forced transfer of control to a handler routine.

a. task b. exception c. interrupt d. kernel call

Computer Science & Information Technology

List at least eight different tasks a service desk staff member might have to perform during a typical day.

What will be an ideal response?

Computer Science & Information Technology