A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?
A.
Phishing scam
B.
Social engineering
C.
Man-in-the-Middle
D.
Shoulder surfing