The type of access attack that allows an attacker to take over a session or spoof a session is done using which technique?
A. brute-force
B. password attack
C. man-in-the-middle
D. malware insertion
The type of access attack that allows an attacker to take over a session or spoof a session is done using which technique?
A. brute-force
B. password attack
C. man-in-the-middle
D. malware insertion