Two-factor authentication can be circumvented through which of the following attacks? A、Denial-of-service B、Man-in-the-middle C、Key logging D、Brute force