What method involves manipulating individuals through psychological tactics to obtain sensitive information or unauthorized access to systems?
a. Social Engineering
b. Open Source Intelligence (OSINT)
c. Active Footprinting
d. DNS Enumeration