Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?

A security engineer has been asked to deploy a secure remote access solution that will allow
employees to connect to the company’s internal network. Which of the following can be
implemented to minimize the opportunity for the man-in-the-middle attack to occur?

A security engineer has been asked to deploy a secure remote access solution that will allow
employees to connect to the company’s internal network. Which of the following can be
implemented to minimize the opportunity for the man-in-the-middle attack to occur?

A.
SSL

B.
Mutual authentication

C.
IPSec

D.
Static IP addresses



Leave a Reply 0

Your email address will not be published. Required fields are marked *