Which of the following protocols is vulnerable to man-in-the-middle attacks by NOT using end to end TLS encryption? SY0-401 Which of the following protocols is vulnerable to man-in-the-middle attacks by NOT using end to end TLS encryption? A. HTTPS B. WEP C. WPA D. WPA 2 Answer: C Learn More : Share this Share on FacebookTweet on TwitterPlus on Google+