I’m not sure what that would look like



Which of these would be the best description of social engineering?

A) Guessing a password based on the most common options

B) Impersonating a help desk technician over the phone

C) Installing malware that is invisible to the operating system

D) Malware that self-replicates between computers

E) Viewing another user’s computer screen from a distance

F) Building a bridge full of socials