A company’s chief cybersecurity architect wants to configure mutual authentication to access an internal payroll website. The architect has asked the administration team to determine the configuration that would provide the best defense against MITM attacks. Which of the folowing implementation approaches would BEST support the architect’s goals?
A. Utilize a challenge-response prompt as required input at username/password entry.
B. Implement TLS and require the client to use its own certificate during handshake.
C. Configure a web application proxy and institute monitoring of HTTPS transactions.
D. Install a reverse proxy in the corporate DMZ configured to decrypt TLS sessions.
How to PASS CAS-004 in First Attempt?FULL Printable PDF and Software. VALID exam to help you PASS. |
B. TSL/SSL encryption secures HTTP network connection thereby protecting against HTTP interception and web-reliant man-in-the-middle attacks. TSL/SSL encryption makes it much harder to intercept communications between the client and the server.
B. Implement TLS and require the client to use its own certificate during handshake.
TLS validation is usually done for the server. However, it can also be used validation both client and server.
https://comodosslstore.com/blog/what-is-ssl-tls-client-authentication-how-does-it-work.html
B. Implement TLS and require the client to use its own certificate during handshake.
TLS validation is usually done for the server. However, it can also be used validation both client and server.
https://comodosslstore.com/blog/what-is-ssl-tls-client-authentication-how-does-it-work.html
B. Implement TLS and require the client to use its own certificate during handshake.
TLS validation is usually done for the server. However, it can also be used validation both client and server.
Source: https://comodosslstore.com/blog/what-is-ssl-tls-client-authentication-how-does-it-work.html