Which option best describes the following situation: An attacker has intercepted network packets between a browser and web server. The attack then re-transmits the intercepted data to the web server hoping the server will respond with useful information (e.g. a session id, credit card information, etc.).
|Threats, Attacks and Vulnerabilities|
|Technologies and Tools|
|Architecture and Design|
|Identity and Access Management|
|Cryptography and PKI|