Answer:
Attackers can exploit insecure communication protocols by intercepting and modifying data exchanged between the client and server in transit, enabling man-in-the-middle attacks.
Attackers can exploit insecure communication protocols by intercepting and modifying data exchanged between the client and server in transit, enabling man-in-the-middle attacks.
You may be interested in:
Web Security MCQs