Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?

A security engineer has been asked to deploy a secure remote access solution that will allow
employees to connect to the company’s internal network. Which of the following can be
implemented to minimize the opportunity for the man-in-the-middle attack to occur?

A security engineer has been asked to deploy a secure remote access solution that will allow
employees to connect to the company’s internal network. Which of the following can be
implemented to minimize the opportunity for the man-in-the-middle attack to occur?

A.
SSL

B.
Mutual authentication

C.
IPSec

D.
Static IP addresses



Leave a Reply 3

Your email address will not be published. Required fields are marked *


RoundHatHacker

RoundHatHacker

Thanks Miguel…without you we were unable to get the answers of all the 877 questions..!!

Tyrone

Tyrone

Please delete all of Miguel’s comments.