EXIN Exam Questions

Which of the following types of attack is a vulnerability of DH?

Which of the following types of attack is a vulnerability of DH?

A.
Man-in-the-middle

B.
IP Spoofing

C.
IP Sequencing

D.
Impersonation

E.
Masquerading