Q. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two partiesare not (Solved)

1. authenticated

2. joined

3. submit

4. separate

  • a. authenticated
Subscribe Now

Get All Updates & News