Which of the following threats is prevented by using token-based authentication?
A. Password sniffing attack on the network
B. Denial of service attack over the network
C. Main-in-the middle attack on the client
D. Session eavesdropping attack on the network
A. Password sniffing attack on the network
B. Denial of service attack over the network
C. Main-in-the middle attack on the client
D. Session eavesdropping attack on the network