Which of the following attacks are prevented from a mutual authentication solution?
Each correct answer represents a complete solution. (Choose all that apply.)
Phishing
Eavesdropping attack
Man-in-the-middle attack
Hijacking
Submit