In an environment where availability is critical such as Industrial control and SCADA networks, which of the following technologies in the MOST critical layer of defense for such systems?
A. Log consolidation
B. Intrusion Prevention system
C. Automated patch deployment
D. Antivirus software
Answer: B. Intrusion Prevention system
Computer Science & Information Technology
You might also like to view...
Describe the packet switching WAN transmission method.
What will be an ideal response?
Computer Science & Information Technology
A duplicate master slide appears in the ________ below the layouts associated with the original master side
Fill in the blank(s) with correct word
Computer Science & Information Technology
In most printing media, when two objects of different colors overlap, they create a(n) _________________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which two cables could attach to an eSATAp port? (Select two.)
A) Video B) Audio C) USB D) Network E) eSATA
Computer Science & Information Technology