A user receives a call from someone reporting to be from the help desk who asks for their<br /> password. The user discovers later that the caller did not work for the help desk.<br /> Which of the following describes this type of exploit?()
A、Phishing scam
B、Social engineering
C、Man-in-the-Middle
D、Shoulder surfing