Which threats are expected in the SAFE SMR remote user network environment? (Choose two)
A.
Trust exploitation
B.
Port redirection attacks
C.
Man in the middle attacks
D.
Network reconnaissance
Explanation:
Network reconnaissance-Protocols filtered at remote-site device to limit effectiveness Man-in-the-middle attacks-Mitigated through encrypted remote traffic REF;Safe white papers;page 26
SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks