Which of the following can be considered as a sound example of social engineering attack?
Select the appropriate answer from below options:
a) Accessing a database with a cracked password
b) An employee giving door access to an unknown person.
c) Installing a hardware keylogger on an employee’s system to capture passwords
d) Calling the help desk and tricking them to reset the password for a user account