jyce8342 jyce8342 28-11-2022 Computers and Technology contestada a man-in-the-middle attack takes advantage of the multihop process used by many types of networks.