Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?
Social engineering attack
Cross site scripting attack
Mail bombing
Password guessing attack
Submit