Answer:
1 Option(A) is the correct answer .
2 Option(A) and Option(B) is the correct answer .
Step-by-step explanation:
1
In this the administrator of the system built the new UTM capable of reviewing the SSL / TLS flow for the suspicious payloads it see that the both inbound traffic flow originating from both the web and stopping on protected application server of the business .The full CA certificate sequence of web servers should be built on a UTM configuration will solve the problem .
2
The Two-factor authentication is used for the security purpose .In this technique only authorized people will accessing the data the unauthorized people is not accessing the data.
- The main objective of two-factor authentication it provide the better security then the other security .
- The Two-factor authentication is ensuring the security of Privileged accounts as well as the reuse restrictions of the password