An attacker intercepts and potentially tampers with communication between two entities without
the knowledge of either of the two entities. This BEST describes which of the following attacks?
A.
SOCKS proxy attack
B.
Man-in-the-middle attack
C.
TCP relay attack
D.
ARP poisoning attack
Explanation: