A user receives an email seemingly from the director of the company’s IT department. The user however notices that the content of the email is asking for information specifically forbidden to be shared with anyone. This type of interaction is known as which of the following?
B. Shoulder surfing