Multiple Choice
A company's chief cybersecurity architect wants to configure mutual authentication to access an internal payroll website. The architect has asked the administration team to determine the configuration that would provide the best defense against MITM attacks. Which of the following implementation approaches would BEST support the architect's goals?
A) Utilize a challenge-response prompt as required input at username/password entry.
B) Implement TLS and require the client to use its own certificate during handshake.
C) Configure a web application proxy and institute monitoring of HTTPS transactions.
D) Install a reverse proxy in the corporate DMZ configured to decrypt TLS sessions.
Correct Answer:

Verified
Correct Answer:
Verified
Q323: A managed service provider is designing a
Q324: A security manager is determining the best
Q325: A security administrator receives reports that several
Q326: A security manager recently categorized an information
Q327: While conducting online research about a company
Q329: An organization is currently performing a market
Q330: A security engineer is assessing the controls
Q331: Given the following output from a security
Q332: A project manager is working with a
Q333: Following a security assessment, the Chief Information