CompTIA Exam Questions

Which of the following BEST describes this type of attack?

Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username
and password to prevent her email box from being deleted immediately. Which of the following BEST describes
this type of attack?

A.
Shoulder surfing

B.
Man-in-the-middle

C.
Social engineering

D.
Ransomware