An end user at a company received a call from someone in the IT department asking for information about the company network. The caller explained the information would be used to improve connection speed, thus improving performance. However, the caller ID on the phone indicated the call came from outside the company. Which of the following types of threats occurred?
A. Session hijacking
B. Social engineering