Watch this video on YouTube
In which of the following phases of social engineering attacks does an attacker collect sensitive information about the organization’s accounts, finance, technologies in use, and upcoming plans?