An __________________ involves the replacement of something benign with something malicious - for example, spoofing, man-in-the-middle attacks, rogue wireless access points, and SQL injection attacks.
a. ANSI manipulation
b. Application layer attack
c. Adware installation
d. Access control bypass