header bg

Question:

Which of the following describes what Jason has done in the case that Jason, an attacker, has manipulated a customer's connection to disconnect the real customer and allow the server to think that he is the authenticated user?

A Active hijacking
Explaination