A security engineer has been asked to deploy a
secure remote access solution that will allow employees to connect to the company-s internal network. Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?
A. SSL
B. Mutual authentication
C. IPSec
D. Static IP addresses