During a security audit, you discover that an employee has been tricked into giving away sensitive information via a phone call with a person posing as IT support. Which type of social engineering attack does this scenario best describe?
Smishing
Pretexting
Vishing
Phishing