Which of the following is an example of social engineering?
A.
Requiring users to work in open office configurations
B.
Getting user passwords by pretending to be help desk staff
C.
Teaching users to change their passwords regularly
D.
Adopting security audit procedures