Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?
A . Social engineering attack
B . Password guessing attack
C . Mail bombing
D . Cross site scripting attack
Answer: A