An unauthorized person recently accessed your enterprise network. The security team had received a call from the threat actor claiming to be a higher official. They followed the attacker's instructions to log them onto a specific webpage, leading to the exposure of enterprise network credentials. Which of the following social engineering techniques was used here?
O Hoaxes and impersonation
O Spam and phishing
O Impersonation and phishing
O Hoaxes and spam