Monitoring the transmission of data across the network using a man-in-the-middle attack presents a threat against which type of data?
At-rest
In-transit
Public
Encrypted
Submit