A user, Jane, receives a call from Peter who states that he is brand new in the help desk. Peter states that he needs to update Janes email client to prevent corruption. At Peter’s request, Jane discloses her user name and password. She later discovers that Peter is not a member of the help desk. Which of the following has occurred?
A. Social engineering
C. Spear phishing