An unidentified person gains access to an office workplace, posing as a new IT staff member. The unidentified person tries to obtain passwords through conversation with other administrators. Which of the following security breaches is occurring?

A.
Social engineering
B.
Brute force cracking
C.
Biometric attack
D.
Phishing