Well done!

You have completed Quiz 1.4!

Quiz Question 1 of 5

Which of the following attacks takes advantage of the initial unencrypted HTTP connection to prevent users from being redirected to a secure HTTPS connection?

Choose the correct answer below:

Skip Quiz Review Instruction