Strong authentication schemes along with message time stamp and sequence numbering can be used as a countermeasure against ________________.
a)Man in the middle attacks
b)Spoofing
c)Message Interception
d)Replay Attacks