A security engineer has been asked to deploy a secure remote access solution that will allow employees to
connect to the company’s internal network. Which of the following can be implemented to minimize the
opportunity for the man-in-the-middle attack to occur?
A.
SSL
B.
Mutual authentication
C.
IPSec
D.
Static IP addresses