Computer Science (Year 9)

Cybersecurity

Which of the following is an example of a social engineering attack?