As per official guide correct answer for below question is C: "Man in the middle". Can anyone explain how attcker will be to read TLS encrypted communication in this case?
Question : The following figure shows an example of an attack where Mal, the attacker, has redirected traffic from a user’s system to their own, allowing them to read TLS encrypted traffic. Which of the following terms best describes this attack?
A. A DNS hijacking attack B. An ARP spoofing attack C. A man-in-the-middle attack D. A SQL injection attack