What type of authentication can prevent a man-in-the-middle attack?

A. Something you know
B. Something you are
C. Something you do
D. Multifactor
E. Mutual

Answer: E. Mutual

Computer Science & Information Technology

You might also like to view...

A calculated control contains an expression that generates a calculated result

Indicate whether the statement is true or false

Computer Science & Information Technology

You should ____ as the second phase in the program development life cycle, after the program requirements have been gathered and analyzed.

A. design the program processing objects B. code the program C. design the user interface D. document the program

Computer Science & Information Technology