A user receives a call from someone reporting to be from the help desk who asks for their
password. The user discovers later that the caller did not work for the help desk. Which of
the following describes this type of exploit?
A.
Phishing scam
B.
Social engineering
C.
Man-in-the-Middle
D.
Shoulder surfing