How do you mitigate the threats presented when using TFTP?
A.
TFTP traffic use peer authentication for each session.
B.
TFTP traffic should be encrypted within an IPSec tunnel.
C.
IP packet inspection should be enabled on all routers.
D.
IP verify reverse path should be enabled on all routers.
Explanation:
Where possible, TFTP traffic should be encrypted within an IPSec tunnel in order to mitigate the chance of its being intercepted.
REF;Safe white papers;page 72
SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks