Which of the following attack method aims to gather confidential information by deceiving the victim?
(1)Spoofing
(2)Phishing
(3)Drive-by Download
(4)Spamming