What security component can be deployed to increase the defense in depth and specifically can be positioned against ‘man-in-the-middle’ attack?
A.
Deploy 802.1AE
B.
Deploy 802.1X
C.
Deploy 802.1Q
D.
Deploy 802.1AX
What security component can be deployed to increase the defense in depth and specifically can be positioned against ‘man-in-the-middle’ attack?
What security component can be deployed to increase the defense in depth and specifically can be positioned against ‘man-in-the-middle’ attack?
A.
Deploy 802.1AE
B.
Deploy 802.1X
C.
Deploy 802.1Q
D.
Deploy 802.1AX