In which of the following Person-to-Person social engineering attacks does an attacker pretend to
be an outside contractor, delivery person, etc., in order to gain physical access to the
organization?
A.
In person attack
B.
Third-party authorization attack
C.
Impersonation attack
D.
Important user posing attack