Techniques to check if a connection was made by a human user, such as CAPTCHAs, are effective against automated attacks like: A . Brute-force: This attack method involves trying many passwords or passphrases with the hope of eventually guessing correctly. B . Dictionary: Similar to brute-force, this attack uses a list of words to attempt to guess passwords or encryption keys. These techniques are not designed to protect against: C . On-path attack: Previously known as a man-in-the-middle attack, where the attacker intercepts communication between two parties. D . Phishing: A social engineering attack aiming to trick users into giving up sensitive information. E . Shoulder surfing: Direct observation techniques, such as looking over someone's shoulder to get information. F . Evil twin: A rogue Wi-Fi access point that appears legitimate but is set up to eavesdrop on wireless communications.