Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)
A . Patching
B . NIDS
C . Segmentation
D . Disabling unused services
E . Firewalling
Answer: CD
Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)
A . Patching
B . NIDS
C . Segmentation
D . Disabling unused services
E . Firewalling
Answer: CD