protocol level security vulnerabilities

Please see the attachment for the question.

Tags: No tags