Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.
Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.
A . Using public key infrastructure authentication.
B . Using basic authentication.
C . Using Secret keys for authentication.
D . Using Off-channel verification.
Answer: ACD
Latest CISSP-ISSAP Dumps Valid Version with 237 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments