Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.

Last Updated on February 12, 2022 by Admin 3

Which of the following are the countermeasures against a man-in-the-middle attack?

Each correct answer represents a complete solution. Choose all that apply.

  • Using Off-channel verification.
  • Using Secret keys for authentication.
  • Using basic authentication.
  • Using public key infrastructure authentication.
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments