0
Reply

Describe a man-in-the-middle attack and how it can be mitigated.