While planning segm...
 
Notifications
Clear all

While planning segmentation for an ICS environment, a security engineer determines IT resources will need access to devices within the ICS environment without compromising security.

1 Posts
1 Users
0 Likes
62 Views
(@ferronigiovanni)
Noble Member
Joined: 2 years ago
Posts: 731
Topic starter  

While planning segmentation for an ICS environment, a security engineer determines IT resources will need access to devices within the ICS environment without compromising security.

To provide the MOST secure access model in this scenario, the jumpbox should be.

  • A . placed in an isolated network segment, authenticated on the IT side, and forwarded into the ICS network.
  • B . placed on the ICS network with a static firewall rule that allows IT network resources to authenticate.
  • C . bridged between the IT and operational technology networks to allow authenticated access.
  • D . placed on the IT side of the network, authenticated, and tunneled into the ICS environment.

Show Answer Hide Answer

Suggested Answer: A

   
Quote
Topic Tags

Latest CS0-002 V1 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: