charityshear388 charityshear388 14-12-2022 Computers and Technology contestada in which of the following forms of attack can an attacker redirect and capture secure transmissions as they occur?