Watch this video on YouTube
Which option best describes the primary objective of social engineering attacks in cyber-security?