CompTIA Exam Questions

Which of the following BEST describes this practice?

An outside user is attempting to access company secured files by collecting information during a phone conversation. Which of the following BEST describes this practice?

A.
Data mining

B.
Social engineering

C.
Intrusion detection

D.
Hacking