What is the key to the success of an MITM attack?
A. The hacked machine becomes overwhelmed with responses.
B. TCP/IP bugs make it easy to crash older operating systems.
C. The attacker waits until after a communication session is established.
D. Packet flooding consumes resources.