A security engineer has been asked to deploy a secure remote access solution that will allow employees to connect to the company’s internal network.
Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?
A . SSL
B . Mutual authentication
C . IPSec
D . Static IP addresses
Answer: C