What is the key to the success of an MITM attack?
A . The hacked machine becomes overwhelmed with responses.
B . TCP/IP bugs make it easy to crash older operating systems.
C . The attacker waits until after a communication session is established.
D . Packet flooding consumes resources.
Answer: C