vmorgan12361 vmorgan12361 05-03-2024 Computers and Technology contestada Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack? a. HTTP or HTTPS b. ICMP c. DNS d. DHCP