Answer:
1 Option(A) is the correct answer .
2 Option(A) and Option(B) is the correct answer .
Explanation:
1
In this the administrator of the system built the new UTM capable of reviewing the SSL / TLS flow for the suspicious payloads it see that the both inbound traffic flow originating from both the web and stopping on protected application server of the business .The full CA certificate sequence of web servers should be built on a UTM configuration will solve the problem .
2
The Two-factor authentication is used for the security purpose .In this technique only authorized people will accessing the data the unauthorized people is not accessing the data.