In an environment where availability is critical such as Industrial control and SCADA networks, which of the following technologies in the MOST critical layer of defense for such systems?

A. Log consolidation
B. Intrusion Prevention system
C. Automated patch deployment
D. Antivirus software


Answer: B. Intrusion Prevention system

Computer Science & Information Technology

You might also like to view...

Describe the packet switching WAN transmission method.

What will be an ideal response?

Computer Science & Information Technology

A duplicate master slide appears in the ________ below the layouts associated with the original master side

Fill in the blank(s) with correct word

Computer Science & Information Technology

In most printing media, when two objects of different colors overlap, they create a(n) _________________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which two cables could attach to an eSATAp port? (Select two.)

A) Video B) Audio C) USB D) Network E) eSATA

Computer Science & Information Technology