Question 57:
Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.
Answer options:
A. Using public key infrastructure authentication. B. Using basic authentication. C. Using Secret keys for authentication. D. Using Off-channel verification.