Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.
A.
Using public key infrastructure authentication.
The countermeasures against a man-in-the-middle attack include:
A. Using public key infrastructure (PKI) authentication.
C. Using secret keys for authentication.
These methods help enhance authentication security and protect against unauthorized interception or manipulation of communication. Basic authentication (option B) is more susceptible to interception and is not as secure as using advanced cryptographic methods like public key infrastructure or secret keys.
Option D (Off-channel verification) is not a standard term in the context of common security measures against man-in-the-middle attacks. The commonly employed methods are public key infrastructure and secret keys.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
n00r1
10 months, 1 week ago