__________ allows the client to set up a "hijacker" process that will intercept selected application-level traffic and redirect it from an unsecured TCP connection to a secure SSH tunnel.
a. Port knocking
b. Packet sniffing
c. Reverse tunneling
d. Application layer firewall