Which of the following protocols is vulnerable to man-in-the-middle attacks by NOT using end to end TLS encryption?

Which of the following protocols is vulnerable to man-in-the-middle attacks by NOT using end to end TLS encryption?




A. HTTPS
B. WEP
C. WPA
D. WPA 2


Answer: C


Learn More :