Last Updated on February 12, 2022 by Admin 3
Which of the following are the countermeasures against a man-in-the-middle attack?
Each correct answer represents a complete solution. Choose all that apply.
- Using Off-channel verification.
- Using Secret keys for authentication.
- Using basic authentication.
- Using public key infrastructure authentication.