Ann, an executive, reports that she received a call from someone asking for information about her email
account. Which of the following type of potential security threats does this scenario describe?
A.
Social engineering
B.
Spoofing
C.
Zero-day
D.
Man-in-the-middle