You are working as a technician at AIOTestKing.com. You boss asks you to identify a possible social engineering attack from the following alternatives. Which alternative would you point out?
A.
An infected computer is used to send email containing viruses or spam.
B.
A caller posing as a company vice president reports a problem with the username/password combination and requests a password reset.
C.
A co-worker watches a user enter the password and later the co-worker logs in as that user.
D.
An unauthorized device is installed by a rogue administrator to capture network traffic.