Which one is an example of a man-in-the-middle attack?

A.
Buffer overflow
B.
DoS attack
C.
All of the above
D.
None of the above
Explanation:
Wrong: Both A and B could be the result of a man-in-the-middle attack, but neither are man-in-themiddle attacks. For example someone who uses a packet capturing device, such as a “sniffer” to
obtain an unencrypted user ID and password to one or more PCs or servers and then the platforms
to launch a DOS attach or create a Buffer Overflow by exploiting an application flaw or OS
Vulnerability.