Which of the following tactics would be MOST effective for an attacker seeking to gather confidential information by exploiting human psychology, rather than technical hacking techniques?
Phishing is the correct answer because it specifically involves tricking individuals into providing sensitive information, such as usernames, passwords, and credit card numbers, through the guise of a trustworthy entity in electronic communication. While piggybacking, shoulder surfing, and tailgating are also forms of social engineering, these tactics generally involve gaining unauthorized physical access or direct observation rather than exploiting human psychology via electronic communication.