Which method will be used to secure a network against man-in-the-middle attack?
A.
Two-factor authentication
B.
Management module
C.
Encryption
D.
Firewall
Which method will be used to secure a network against man-in-the-middle attack?
Which method will be used to secure a network against man-in-the-middle attack?
A.
Two-factor authentication
B.
Management module
C.
Encryption
D.
Firewall