Which of the following implementation approaches would BEST support the architect’s goals?

A company’s chief cybersecurity architect wants to configure mutual authentication to access an internal payroll website. The architect has asked the administration team to determine the configuration that would provide the best defense against MITM attacks .

Which of the following implementation approaches would BEST support the architect’s goals?
A . Utilize a challenge-response prompt as required input at username/password entry.
B . Implement TLS and require the client to use its own certificate during handshake.
C . Configure a web application proxy and institute monitoring of HTTPS transactions.
D . Install a reverse proxy in the corporate DMZ configured to decrypt TLS sessions.

Answer: C

Latest CAS-003 Dumps Valid Version with 509 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments