Jane, an individual, has recently been calling various financial offices pretending to be another
person to gain financial information. Which of the following attacks is being described?

A.
Phishing
B.
Tailgating
C.
Pharming
D.
Vishing
Explanation: