A user receives an email seemingly from the director of the company’s IT department. The
user however notices that the content of the email is asking for information specifically
forbidden to be shared with anyone. This type of interaction is known as which of the
following?
A.
Phishing
B.
Shoulder surfing
C.
Malware
D.
Spyware