Watch this video on YouTube
Which of the following scenarios best describes a baiting attack in the context of social engineering?