And the answer is...
An attempt by an unauthorized user to gain access to a system by posing as an authorized user
Form your question now...
Were you right?
Correct Question.