A technician is approached by a person claiming to be a new employee who asks several questions about how the company’s network is configured. When the technician reports the incident to the supervisor, the supervisor discovers that the person is not an employee. The technician has been a victim of:
A.
identify theft.
B.
social engineering.
C.
mistaken identity.
D.
terrorism.