A _____ is a type of attack where a hacker tries to gain access to a network by pretending to be a trusted entity.
spoofing
eavesdropping
hacking
phishing