Which method will be used to secure a network against man-in-the-middle attack?

Which method will be used to secure a network against man-in-the-middle attack?

Which method will be used to secure a network against man-in-the-middle attack?

A.
Two-factor authentication

B.
Management module

C.
Encryption

D.
Firewall



Leave a Reply 0

Your email address will not be published. Required fields are marked *