Which of these would be the best description of social engineering?
A) Guessing a password based on the most common options
B) Impersonating a help desk technician over the phone
C) Installing malware that is invisible to the operating system
D) Malware that self-replicates between computers
E) Viewing another user’s computer screen from a distance
F) Building a bridge full of socials