Posted by: Pdfprep
Post Date: December 21, 2020
An organization recently faced a cyberattack where an attacker captured legitimate user credentials and gained access to the critical information systems. He also led other malicious hackers in gaining access to the information systems. To defend and prevent such attacks in future, the organization has decided to route all the incoming and outgoing network traffic through a centralized access proxy apart from validating user credentials.
Which of the following defensive mechanisms the organization is trying to strengthen?
A . Authentication
B . Serialization
C . Encryption
D . Hashing
Answer: A
Leave a Reply