an unauthorized person recently accessed your enterprise network. the security team had received a call from the threat actor claiming to be a higher official. they followed the attacker's instructions to log them onto a specific webpage, leading to the exposure of enterprise network credentials. which of the following social engineering techniques was used here?