Implementing Cisco Network Security (IINS v3.0) (#100)

In which form of fraud does an attacker try to learn information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels?

Identity Spoofing
Phishing
Hacking
Smurfing