What type of authentication can prevent a man-in-the-middle attack?
A. Something you know
B. Something you are
C. Something you do
D. Multifactor
E. Mutual
Answer: E. Mutual
Computer Science & Information Technology
You might also like to view...
A calculated control contains an expression that generates a calculated result
Indicate whether the statement is true or false
Computer Science & Information Technology
You should ____ as the second phase in the program development life cycle, after the program requirements have been gathered and analyzed.
A. design the program processing objects B. code the program C. design the user interface D. document the program
Computer Science & Information Technology