Which of the following threats is prevented by using token-based authentication?
A. Password sniffing attack on the network
B. Session eavesdropping attack on the network
C. Man-in-the-middle attack on the client
D. Denial of service attack over the network
A. Password sniffing attack on the network
B. Session eavesdropping attack on the network
C. Man-in-the-middle attack on the client
D. Denial of service attack over the network