Answer:
Attackers can exploit the lack of encryption by intercepting and analyzing unencrypted communication, allowing them to perform traffic analysis and gather sensitive information about user activities.
Attackers can exploit the lack of encryption by intercepting and analyzing unencrypted communication, allowing them to perform traffic analysis and gather sensitive information about user activities.
You may be interested in:
Web Security MCQs