Which of the following BEST describes why vulnerabilities found in ICS and SCADA can be difficult to remediate?
A . ICS/SCADA systems are not supported by the CVE publications.
B . ICS/SCADA systems rarely have full security functionality.
C . ICS/SCADA systems do not allow remote connections.
D . ICS/SCADA systems use encrypted traffic to communicate between devices.
Answer: A