A security consultant found a SCADA device in one of the VLANs in scope.
Which of the following actions would BEST create a potentially destructive outcome against device?
A. Launch an SNMP password brute force attack against the device.
B. Lunch a Nessus vulnerability scan against the device.
C. Launch a DNS cache poisoning attack against the device.
D. Launch an SMB exploit against the device.