Which of the following provides the best protection against a man-in-the-middle attack?

A.
Strong password
B.
Firewall
C.
Strong encryption
D.
Fiber-optic cable
Explanation:
A strong encryption provides the best protection against a man-in-the-middle attack. Man-in-the- middle attacks occur when an attacker successfully inserts an intermediary software or program between two communicating hosts. The intermediary software or program allows attackers to listen to and modify the communication packets passing between the two hosts. The software intercepts the communication packets and thensends the information to the receiving host. The receiving host responds to the software, presuming it to be the legitimate client.