Sharon wishes to communicate with George. During the exchange of public key between Sharon and George, Craig is able to intercept the key. And as soon as the communications begins, Craig is able to intercept the message to George, forges it and sends it to him. What sort of attack is this and what would you deploy to defend against this?
A.
Anti-spoofing attack, and the defense is Public key infrastructures
B.
Man-in-the-middle attack, and the defense is Public key infrastructures
C.
Denial of serviceattack, and the defense is Digital Certificate
D.
Malicious code, and the defense is Public key infrastructures
E.
Man-in-the-middle attack, and the defense is Syndefense