Which of the following mitigation techniques is MOST effective against a man-in-the-middle attack?
A. Authentication
B. Encryption
C. Popup blocker
D. ACL
Answer: A. Authentication
Computer Science & Information Technology
You might also like to view...
To delete a row from a table, the insertion point must be in the first cell of the row you wish to delete
Indicate whether the statement is true or false
Computer Science & Information Technology
What are three common ways that the value of a loop control variable is changed during the loop's execution?
What will be an ideal response?
Computer Science & Information Technology