Register
5:00
Stop
CISSP - Security Assessment and Testing
Expert
1/5
Which of the following is a weakness that is exploited in a man-in-the-middle attack?
a.
Cross Site Scripting
b.
SQL Injection
c.
Weak Encryption
d.
Buffer Overflow
Expert