“Meet in the middle attack” is an attack
(a) where the timing required for the attack via brute force is drastically reduced
(b) where the adversary uses 2 or more machines to decrypt thus trying to reduce the time
(c) where messages are intercepted and then either relayed or substituted with another message
(d) where cryptanalysis takes lesser time than the brute force decryption
The question was asked in unit test.
I'm obligated to ask this question of Symmetric Key Distribution topic in chapter Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security