In which of the following attacks does an attacker pretend to be a legitimate or authorized person and uses a phone or other communication medium to mislead targets and trick them into revealing information?
A. Dumpster Diving
B. Eavesdropping
C. Impersonation
D. Shoulder Surfing
Answer: C. Impersonation
Computer Science & Information Technology