A hаcker intercepts а trаnsmissiоn frоm a client tо a server. The data is encrypted, and the hacker is unable to decrypt it, but he sends two (2) copies of the original data to the server. The scenario described above is best categorized as an example of …