Which option best describes the following situation: An attacker has intercepted network packets between a browser and web server. The attack then re-transmits the intercepted data to the web server hoping the server will respond with useful information (e.g. a session id, credit card information, etc.).
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts