Which one is an example of a man-in-the-middle attack?

A.
Buffer overflow
B.
DoS attack
C.
All of the above
D.
None of the above
Explanation:
Wrong: Both A and B could be the result of a man-in-the-middle attack, but neither
are man-in-the-middle attacks. For example someone who uses a packet capturing device, such
as a “sniffer” to obtain an unencrypted user ID and password to one or more PCs or servers and
then the platforms to launch a DOS attach or create a Buffer Overflow by exploiting an application
flaw or OS Vulnerability.