Which of the following BEST describes this practice? seenagape 13 years ago An outside user is attempting to access company secured files by collecting information during a phone conversation. Which of the following BEST describes this practice? A.Data mining B.Social engineering C.Intrusion detection D.Hacking ← Previous question Next question →