Which of the following types of attacks occurs when an attacker successfully inserts an
intermediary software or program between two communicating hosts?
A.
Password guessing attack
B.
Dictionary attack
C.
Man-in-the-middle attack
D.
Denial-of-service attack
Explanation: