A help desk technician receives a phone call from a user reporting a computer problem. During the
phone call, the user starts a conversation with the technician asking detailed information about
personnel in upper management. The technician then asks the users name again, after which the
user promptly hangs up. Which of the following attacks did the technician experience?
A.
Phishing attack
B.
Eavesdropping attack
C.
Social engineering attack
D.
Spyware attack
Explanation: