Which of the following types of attacks occurs when an attacker successfully inserts an
intermediary software or program between two communicating hosts?
A.
Denial-of-service attack
B.
Dictionary attack
C.
Man-in-the-middle attack
D.
Password guessing attack
Explanation:
When an attacker successfully inserts an intermediary software or program between
two communicating hosts, it is known as man-in-the-middle attack.