Published:   30-Nov--0001
(a) When an attacker controls more than half of the network's computing power
(b) When an attacker steals 51% of the coins in circulation
(c) When an attacker gains access to 51% of the nodes on the network
(d) When an attacker gains access to 51% of the private keys
Answer:
When an attacker controls more than half of the network's computing power