Which type of attack allows the complete disclosure or destruction of all data on a system and allows attackers to spoof identity, tamper with existing data, and cause repudiation issues such as voiding transactions or changing balances?
A) Man-in-the-Middle (MitM) attack
B) Eavesdropping attack
C) Denial-of-Service (DoS) attack
D) Integrity attack