A penetration tester is measuring a company’s posture on social engineering. The penetration tester sends a
phishing email claiming to be from IT asking employees to click a link to update their VPN software
immediately. Which of the following reasons would explain why this attack could be successful?
Principle of Scarcity
Principle of Intimidation
Principle of Urgency
Principle of liking