During a security audit, you discover that an employee has been tricked into giving away sensitive information via a phone call with a person posing as IT support. Which type of social engineering attack does this scenario best describe?
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts