Which of the folowing implementation approaches would BEST support the architect’s goals?

A company’s chief cybersecurity architect wants to configure mutual authentication to access an internal payroll website. The architect has asked the administration team to determine the configuration that would provide the best defense against MITM attacks. Which of the folowing implementation approaches would BEST support the architect’s goals?
A. Utilize a challenge-response prompt as required input at username/password entry.
B. Implement TLS and require the client to use its own certificate during handshake.
C. Configure a web application proxy and institute monitoring of HTTPS transactions.
D. Install a reverse proxy in the corporate DMZ configured to decrypt TLS sessions.

How to PASS CAS-004 in First Attempt?

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

4 thoughts on “Which of the folowing implementation approaches would BEST support the architect’s goals?

  1. B. TSL/SSL encryption secures HTTP network connection thereby protecting against HTTP interception and web-reliant man-in-the-middle attacks. TSL/SSL encryption makes it much harder to intercept communications between the client and the server.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.