CompTIA A+ Core 2 Question I-18

An individual pretending to be a consultant trying to gain access to information is an example of which of the following?

A. Chassis Intrusion
B. Principle of Least Privilege
C. Social Engineering
D. Identity Theft

Correct Answer: C