What should be implemented to mitigate man-in-middle attacks in the data access layer?

What should be implemented to mitigate man-in-middle attacks in the data access layer?

What should be implemented to mitigate man-in-middle attacks in the data access layer?

A.
VACLs

B.
PVLANs

C.
Reverse Path Forwarding

D.
Dynamic ARP Inspection



Leave a Reply 0

Your email address will not be published. Required fields are marked *