Which of the following describes the phishing method of information security crime?
physically interacting with the victim and using her computer when she is not looking
rifling through recycling bins to find account information
pretending to be someone else when asking for information
all of these