When considering a vendor-specific vulnerability in critical industrial control systems which of the following techniques supports availability?
A. Deploying identical application firewalls at the border
B. Incorporating diversity into redundant design
C. Enforcing application white lists on the support workstations
D. Ensuring the systems' anti-virus definitions are up-to-date
Answer: B. Incorporating diversity into redundant design
You might also like to view...
How does personalization differ from conventional user and task analysis?
What will be an ideal response?
A(n) ________ database contains data that is divided into several tables that can be related to each other by a common field
Fill in the blank(s) with correct word
The ability to switch between programs makes computers multipurpose devices.
Answer the following statement true (T) or false (F)
Pseudocode expresses the steps in a program, module, or method, but it uses English-like statements in place of the flowchart's graphical symbols.
Answer the following statement true (T) or false (F)