Which of the following describes an unauthorized user redirecting wireless network traffic from the
intended access point to a laptop to inject a packet with malware?
A.
A man-in-the-middle attack
B.
A replay attack
C.
A: Social engineering
D.
A weak key