This is a classic example ofsocial engineering, where an attacker manipulates individuals into giving up confidential information, such as credentials, by pretending to be someone trustworthy (like help desk staff). * B. Tailgatinginvolves physical access without authentication. * C. Shoulder surfingis spying over someone's shoulder to steal info. * D. Smishingis phishing via SMS. * E. Evil twininvolves a rogue Wi-Fi access point impersonating a legitimate one. #Reference: CompTIA Network+ N10-009 Official Objectives: 4.2 - Identify common security threats and vulnerabilities.