The term which refers to the attempt to gain unauthorized access to systems and computers used bya telephone company to operate its telephone network is a _____.Select one:

a. Phone hacker
b. Hacktivist
c. commh@ck3r
d. phreaker