What are man in the middle attacks?
(a) Users are forced to use a second server which causes the attack
(b) Users are forced to divert to a fake site where the attack takes place
(c) Users are fooled by similar GUI and data is extracted from them.
(d) None of the mentioned
The question was asked by my school principal while I was bunking the class.
The query is from Application Security in portion Application Design and Development of RDBMS