Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username
and password to prevent her email box from being deleted immediately. Which of the following BEST describes
this type of attack?
A.
Shoulder surfing
B.
Man-in-the-middle
C.
Social engineering
D.
Ransomware