An outside user is attempting to access company secured files by collecting information during a
phone conversation. Which of the following BEST describes this practice?
A.
Data mining
B.
Social engineering
C.
Intrusion detection
D.
Hacking
Explanation: