A company's chief cybersecurity architect wants to configure mutual authentication to access an internal payroll website. The architect has asked the administration team to determine the configuration that would provide the best defense against MITM attacks. Which of the following implementation approaches would BEST support the architect's goals?
A) Utilize a challenge-response prompt as required input at username/password entry.
B) Implement TLS and require the client to use its own certificate during handshake.
C) Configure a web application proxy and institute monitoring of HTTPS transactions.
D) Install a reverse proxy in the corporate DMZ configured to decrypt TLS sessions.
Correct Answer:
Verified
Q284: Within the past six months, a company
Q285: A project manager is working with system
Q286: During the deployment of a new system,
Q287: A security administrator is troubleshooting RADIUS authentication
Q288: A company has decided to replace all
Q290: An administrator has noticed mobile devices from
Q291: A newly hired Chief Information Security Officer
Q292: A security administrator is concerned about the
Q293: Following the successful response to a data-leakage
Q294: A systems administrator receives an advisory email
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents