An attack in which the attacker captures data and attempts to resubmit the data so that a device, such as a workstation or router, thinks a legitimate connection is in effect.
a. Data capture attack
b. Man-in-the-middle attack
c. Replay attack
d. Spoofing attack