An attacker who is pretending to be a known user within the organization is said to be conducting a(n) __________attack.

A. impersonation

B. physical

C. consensus/social proof

D. scarcity