The correct answer is (d) Man-in-the-middle
Easiest explanation - In such attacks, a user attempting to connect to the application is diverted to a fake Web site, which accepts the password from the user, and uses it immediately to authenticate to the original application.