Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?
A. Denial-of-service attack
B. Dictionary attack
C. Man-in-the-middle attack
D. Password guessing attack
A. Denial-of-service attack
B. Dictionary attack
C. Man-in-the-middle attack
D. Password guessing attack