Which attack is based on the impersonation of a legitimate host?
a) Man-in-the-Middle (MitM) attack
b) DDoS (Distributed Denial of Service) attack
c) SQL Injection attack
d) Phishing attack