A user receives a phone call at home from someone claiming to be from their company’s IT help
desk. The help desk person wants to verify their username and password to ensure that the user’s
account has not been compromised. Which of the following attacks has just occurred?
A.
Evil twin
B.
Phishing
C.
Man-in-the-middle
D.
Social engineering