In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.

In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. 



A) zombie-in-the-middle
B) sniff-in-the-middle
C) server-in-the-middle
D) man-in-the-middle


Answer: D


Learn More :