A spoofing attack. "<span>a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage."</span>
Primary memory usually refers to Random Access Memory (RAM), while secondary storage refers to devices such as hard disk drives, solid-state drives, removable “USB” drives, CDs, and DVDs.