PdfPrep.com

Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?

A security engineer has been asked to deploy a secure remote access solution that will allow employees to connect to the company’s internal network.

Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?
A . SSL
B . Mutual authentication
C . IPSec
D . Static IP addresses

Answer: C

Exit mobile version