An attacker is attempting to extract sensitive information from a company's employee by impersonating a trusted individual over the phone. What is this type of social engineering attack called?
Business email compromise
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts