What security component can be deployed to increase the defense in depth and specifically can be positioned against ‘man-in-the-middle’ attack?
A. Deploy 802.1AE
B. Deploy 802.1X
C. Deploy 802.1Q
D. Deploy 802.1AX
What security component can be deployed to increase the defense in depth and specifically can be positioned against ‘man-in-the-middle’ attack?
A. Deploy 802.1AE
B. Deploy 802.1X
C. Deploy 802.1Q
D. Deploy 802.1AX