The security team at Certkiller Inc. is working on mitigating attacks to the network, Which threats are expected in the SAFE SMR remote user network environment? (Choose two)
A.
The expected threats are man-in-the-middle attacks
B.
The expected threats are Network reconnaissance
C.
The expected threats are Trust exploitation
D.
The expected threats are Port redirection attacks
Explanation:
Network reconnaissance-Protocols filtered at remote-site device to limit effectiveness Man-in-the-middle attacks-Mitigated through encrypted remote traffic REF;Safe white papers;page 26
SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks