What is an Impersonation Attack?

by

Reading Time: 7 min
What is an Impersonation Attack?