Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?

Posted by: Pdfprep Category: 312-50v10 Tags: , ,

A security engineer has been asked to deploy a secure remote access solution that will allow employees to connect to the company’s internal network.

Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?
A . SSL
B . Mutual authentication
C . IPSec
D . Static IP addresses

Answer: C

Leave a Reply

Your email address will not be published.