An organization wants to protect against eavesdropping and replay attacks when users authenticate remotely over the network. Which of the following mechanisms BEST addresses this requirement?
A. Using a one-time password (OTP) system
B. Encrypting the password database with AES
C. Implementing network segmentation with firewalls
D. Deploying mandatory access control (MAC) on critical servers