Which of the following are the countermeasures against a man-in-the-middle attack? Each correct
answer represents a complete solution. Choose all that apply.
A.
Using public key infrastructure authentication.
B.
Using basic authentication.
C.
Using Secret keys for authentication.
D.
Using Off-channel verification.
Explanation:
A user can follow various methods to mitigate a man-in-the-middle attack. To
overcome these attacks use authentication techniques that are
based on the following:
Public key infrastructures
Stronger mutual authentication
Secret keys (high information entropy secrets)
Passwords (low information entropy secrets)
Other criteria, such as voice recognition or other biometrics
Off-the-Record Messaging for instant messaging
Off-channel verification
Carry-forward verification