Multiple Choice
While planning segmentation for an ICS environment, a security engineer determines IT resources will need access to devices within the ICS environment without compromising security. To provide the MOST secure access model in this scenario, the jumpbox should be __________.
A) placed in an isolated network segment, authenticated on the IT side, and forwarded into the ICS network.
B) placed on the ICS network with a static firewall rule that allows IT network resources to authenticate.
C) bridged between the IT and operational technology networks to allow authenticated access.
D) placed on the IT side of the network, authenticated, and tunneled into the ICS environment.
Correct Answer:

Verified
Correct Answer:
Verified
Q132: A security analyst is investigating a compromised
Q133: The security team at a large corporation
Q134: Which of the following are components of
Q135: When attempting to do a stealth scan
Q136: A cybersecurity analyst is contributing to a
Q138: Given the Nmap request below: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1257/.jpg"
Q139: A security analyst gathered forensics from a
Q140: An audit has revealed an organization is
Q141: A team of security analysts has been
Q142: A Chief Security Officer (CSO) is working