18. Intercepting a user's credentials and retransmitting them in the hopes ofauthenticating as a _________ attack.(A)session hijacking(B) replay(C) man-in-the-middle(D) spoofing