Consider the following image:
From the information in this image, what type of attack is occurring?
A.
A man-in-the-middle attack
B.
A brute-force attack
C.
A connection-hijacking attackC.A connection-hijacking attack
D.
A spoofing attackD.A spoofing attack