Which of the following BEST describes why vulnerabilities found in ICS and SCADA can be difficult to remediate?
A. ICS/SCADA systems are not supported by the CVE publications.
B. ICS/SCADA systems rarely have full security functionality.
C. ICS/SCADA systems do not allow remote connections.
D. ICS/SCADA systems use encrypted traffic to communicate between devices.