A security engineer has been asked to deploy a secure remote access solution that will allow
employees to connect to the company’s internal network. Which of the following can be
implemented to minimize the opportunity for the man-in-the-middle attack to occur?
A.
SSL
B.
Mutual authentication
C.
IPSec
D.
Static IP addresses