header bg

Question:

What influence principle was in use if Joe is studying a recent social engineering attack that occurred against his organization and the attacker phoned an administrative assistant and said that her files were being deleted and that he needed the assistant’s password to stop the loss of data?

A Urgency
Explaination