A man-in-the-middle attack takes advantage of which of the following?

A man-in-the-middle attack takes advantage of which of the following?



a. TCP handshake
b. UDP handshake
c. Juggernaut
d. All of the above






Answer: A


Learn More :

Network Security

Learn More Multiple Choice Question :