There are many ways that people can be manipulated to disclose knowledge that can be used to jeopardize security. one of these ways is to call someone under the false pretense of being from the it department. this is known as _________________________. hacking social engineering pretexting exploitation