Right option is (c) Domain Hijacking
The explanation is: The network hijacking is implemented on the data flow of protocol shared by all web applications. Examples of network level hijacking are TCP/IP hijacking, RST hijacking, blind hijacking UDP hijacking etc.