During a post-mortem incident evaluation, it is discovered that coercion was used by an attacker to infiltrate the company and obtain confidential information. This tactic would best be characterized as:
A.
Eavesdropping
B.
Passive
C.
Active
D.
Sniffing