Which of the following are the countermeasures against a man-in-the-middle attack?
Each correct answer represents a complete solution. Choose all that apply.
Using Secret keys for authentication.
Using public key infrastructure authentication.
Using Off-channel verification.
Using basic authentication.
Submit