A user, Ann, receives a call from Joe who states that he is brand new in the help desk. Joe states that
he needs to update Ann’s email client to prevent corruption. At Joe’s request, Ann discloses her user
name and password. She later discovers that Joe is not a member of the help desk. Which of the
following has occurred?
A.
Social engineering
B.
Phishing
C.
Spear phishing
D.
Hijacking