The act of intercepting the first message in a public key exchange and substituting a bogus key for
the original key is an example of which style of attack?
A.
Spoofing
B.
Hijacking
C.
ManIn The Middle
D.
Social Engineering
E.
Distributed Denial of Service (DDoS)