hahah9747 hahah9747 11-01-2024 Computers and Technology contestada An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?A Oman in the middleB buffer overflowC trust exploitationD port redirection