With ___________________ attack, an attacker hijacks a session but do not alter anything. They just sit back and watch or record all the traffic and data being sent forth.
(a) network session hijacking
(b) passive session hijacking
(c) active session hijacking
(d) social-networking session hijacking