Which threats are expected in the SAFE SMR remote user network environment?

Which threats are expected in the SAFE SMR remote user network environment? (Choose two)

Which threats are expected in the SAFE SMR remote user network environment? (Choose two)

A.
Trust exploitation

B.
Port redirection attacks

C.
Man in the middle attacks

D.
Network reconnaissance

Explanation:

Network reconnaissance-Protocols filtered at remote-site device to limit effectiveness Man-in-the-middle attacks-Mitigated through encrypted remote traffic REF;Safe white papers;page 26
SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks



Leave a Reply 0

Your email address will not be published. Required fields are marked *