An employee in your organization received a call from an individual claiming to be from the IT department. The caller stated they were conducting routine security checks and needed the employee's username and password to ensure his account is secure. The caller is exceptionally polite and knowledgeable about company protocols. Which type of social engineering attack is MOST likely occurring?
Quid pro quo
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts