Which of the following is considered social engineering?
A.
Taking advantage of faults in the design of software to gain access
B.
Claiming to be someone else and asking for a reset of a login password
C.
Designing a computer virus which collects credit card information from files
D.
Asking a customer for information about a problem with their computer