A help desk technician receives a phone call from a user reporting a computer problem. During the phone call, the user starts a conversation with the technician asking detailed information about personnel in upper management. The technician then asks the user’s name again, after which the user promptly hangs up. Which of the following attacks did the technician experience?
A.
Phishing attack
B.
Eavesdropping attack
C.
Social engineering attack
D.
Spyware attack