Hayes, a security professional, was tasked with the implementation of security controls for an industrial network at the Purdue level 3.5 (IDMZ). Hayes verified all the possible attack vectors on the IDMZ level and deployed a security control that fortifies the IDMZ against cyber-attacks.
Identify the security control implemented by Hayes in the above scenario.
kanchantanwani
Highly Voted 1 year, 4 months agoa342364
Most Recent 2 months, 2 weeks agoAhmed3yad
1 year, 1 month ago