Gotta go with A on this one. Relying on IP addresses for authentication is just asking for trouble. You might as well hand over the keys to the kingdom.
I'm pretty sure the answer is C. Who needs encryption when you can just spoof the IP address and bypass it all together? Classic move, if I do say so myself.
Karl
5 months agoGertude
3 months agoAlonzo
3 months agoGwenn
3 months agoCassie
4 months agoTrinidad
4 months agoKimbery
4 months agoValentin
5 months agoWilliam
4 months agoAsha
4 months agoKate
5 months agoShannan
5 months agoSheldon
5 months agoVeronika
4 months agoWilda
4 months agoElina
4 months agoJerry
5 months agoKate
5 months agoLeonora
6 months agoBillye
5 months agoJillian
5 months agoKenda
5 months agoLura
5 months agoSamira
5 months agoGaston
5 months agoShannan
6 months ago