A security consultant found a SCADA device in one of the VLANs in scope.
Which of the following actions would BEST create a potentially destructive outcome against device?
A . Launch an SNMP password brute force attack against the device.
B . Lunch a Nessus vulnerability scan against the device.
C . Launch a DNS cache poisoning attack against the device.
D . Launch an SMB exploit against the device.
Answer: A