What type of attack is shown in the following diagram?
A.
Man-in-the-Middle (MiTM) Attack
B.
Session Hijacking Attack
C.
SSL Spoofing Attack
D.
Identity Stealing Attack
Explanation:
the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.
A