Which method will be used to secure a network against man-in-the-middle attack?
A. Two-factor authentication
B. Management module
C. Encryption
D. Firewall
Which method will be used to secure a network against man-in-the-middle attack?
A. Two-factor authentication
B. Management module
C. Encryption
D. Firewall