While planning segmentation for an ICS environment, a security engineer determines IT resources will need access to devices within the ICS environment without compromising security. To provide the MOST secure access model in this scenario, the jumpbox should be __________.
A) placed in an isolated network segment, authenticated on the IT side, and forwarded into the ICS network.
B) placed on the ICS network with a static firewall rule that allows IT network resources to authenticate.
C) bridged between the IT and operational technology networks to allow authenticated access.
D) placed on the IT side of the network, authenticated, and tunneled into the ICS environment.
Correct Answer:
Verified
Q1: A security analyst on the threat-hunting team
Q2: A Chief Information Security Officer (CISO) wants
Q3: Which of the following software security best
Q4: A security analyst suspects a malware infection
Q5: A security analyst received a SIEM alert
Q7: A development team uses open-source software and
Q8: An information security analyst is compiling data
Q9: A security analyst is providing a risk
Q10: Which of the following would MOST likely
Q11: Which of the following roles is ultimately
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents