Which of the following is the BEST example of detection-in-depth best practices?
Available Choices (select all choices that are correct)
A . Firewalls and unexpected protocols being used
B. IDS sensors deployed within multiple zones in the production environment
C. Role-based access control and unusual data transfer patterns
D. Role-based access control and VPNs
Answer: B
Latest ISA-IEC-62443 Dumps Valid Version with 88 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund