is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path. O host attack O client attack O Trojan horse attack eavesdropping attack