An attacker eavesdrops on a network to capture a consumer’s credentials, which can be
used to hijack the consumer’s account. Which mechanism should the cloud service provider
deploy to mitigate the risk of an account hijacking attack?

A.
Firewall
B.
Access control list
C.
Multi-factor authentication
D.
Encrypting data-at-rest