The correct answer is 'True'. Social engineering attacks exploit human psychology rather than technological weaknesses. Such attacks convince individuals to provide sensitive information, perform certain actions, or compromise security protocols which they otherwise might not. Examples of such behaviors include sharing passwords or allowing access to restricted areas. Other answers are incorrect as they either state the opposite or do not address the human-centric nature of social engineering.