And the answer is...

An attempt by an unauthorized user to gain access to a system by posing as an authorized user

Form your question now...


Were you right?

Correct Question.