Which of the following can take advantage of man in the middle techniques to prevent data exfiltration?
Which of the following practices would best allow for this testing while keeping the corporate network safe?