Juanv4798 Juanv4798 09-03-2022 Computers and Technology contestada In which type of attack does a person, program, or computer disguise itself as another person, program, or computer to gain access to a resource