Which of the following remediation strategies is MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)
A. Patching
B. NIDS
C. Segmentation
D. Disabling unused services
E. Firewalling
Which of the following remediation strategies is MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)
A. Patching
B. NIDS
C. Segmentation
D. Disabling unused services
E. Firewalling