When considering a vendor-specific vulnerability in critical industrial control systems which of the following techniques supports availability?

A. Deploying identical application firewalls at the border
B. Incorporating diversity into redundant design
C. Enforcing application white lists on the support workstations
D. Ensuring the systems' anti-virus definitions are up-to-date


Answer: B. Incorporating diversity into redundant design

Computer Science & Information Technology

You might also like to view...

How does personalization differ from conventional user and task analysis?

What will be an ideal response?

Computer Science & Information Technology

A(n) ________ database contains data that is divided into several tables that can be related to each other by a common field

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ability to switch between programs makes computers multipurpose devices.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Pseudocode expresses the steps in a program, module, or method, but it uses English-like statements in place of the flowchart's graphical symbols.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology