A CEO is concerned about staff browsing inappropriate material on the Internet via HTTPS. It has been suggested that the company purchase a product which could decrypt the SSL session, scan the content and then repackage the SSL session without staff knowing. Which of the following type of attacks is similar to this product?
A.
Replay
B.
Spoofing
C.
TCP/IP hijacking
D.
Man-in-the-middle