During a normal workday, you receive a call at your desk asking for information about a recently submitted help desk ticket. Two things are remarkable about this particular call; you notice that the call is coming from an outside line, and you don’t have any recent help desk tickets. What security exploit should you be concerned about?
A) Phishing
B) Spyware
C) Social Engineering
D) Baiting
Pages: 1 2