Which method will be used to secure a network against man-in-the-middle attack?
A . Two-factor authentication
B . Management module
C . Encryption
D . Firewall
Answer: C
Which method will be used to secure a network against man-in-the-middle attack?
A . Two-factor authentication
B . Management module
C . Encryption
D . Firewall
Answer: C