Which of the following are the countermeasures against a man-in-the-middle attack?

Which of the following are the countermeasures against a man-in-the-middle attack? Each correct
answer represents a complete solution. Choose all that apply.

Which of the following are the countermeasures against a man-in-the-middle attack? Each correct
answer represents a complete solution. Choose all that apply.

A.
Using public key infrastructure authentication.

B.
Using basic authentication.

C.
Using Secret keys for authentication.

D.
Using Off-channel verification.

Explanation:
A user can follow various methods to mitigate a man-in-the-middle attack. To
overcome these attacks use authentication techniques that are
based on the following:
Public key infrastructures
Stronger mutual authentication
Secret keys (high information entropy secrets)
Passwords (low information entropy secrets)
Other criteria, such as voice recognition or other biometrics
Off-the-Record Messaging for instant messaging
Off-channel verification
Carry-forward verification



Leave a Reply 0

Your email address will not be published. Required fields are marked *