Like open-ended questions, closed questions require the interviewee to give answers that fall within a predictable range.
Indicate whether the statement is true or false
Question 2
The key exchange protocol is vulnerable to a man-in-the-middle attack because it does not authenticate the participants.
Indicate whether the statement is true or false.