首页 > 试题广场 >

In the man-in-the-middle attac

[问答题]
In the man-in-the-middle attack in Figure 8.21 , Alice has not authenticated Bob. If Alice were to require Bob to authenticate himself using ap5.0, would the man-in-the-middle attack be avoided? Explain your reasoning.

这道题你会答吗?花几分钟告诉大家答案吧!