A person claiming to be from central it called chris and asked him to participate in a password reset audit. the person had chris change his password to the word "123456", and then again to a secret passphrase only chris knew. later that day chris noticed odd system behavior, and then the system crashed. chris was a victim of ________.
Phishing When a user of technology is targeted by a thief posing as a legitimate individual or company, this practice is known as phishing. He should have confirmed with his company's Central IT department to confirm that this was legitimate.