Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection against a man-in-the-middle attack?
Which of the following is the PRIMARY consideration to ensure control of remote access is aligned to the privacy policy?