strategies for preventing man-in-the-middle attacks include: group of answer choices restrict distribution of public keys so that only authorized people get them publish individual keys widely so that people can double check their copies use public-key certificates do not use a hash