Endpoint logs indicate that a machine has obtained an unusual gateway address and unusual DNS servers via DHCP.
Which option is this situation most likely an example of?
A . command injection
B . man in the middle attack
C . evasion methods
D . phishing
Answer: B