She has performed an impersonation attack. She has taken on the character of another (usually more important) person and has used these credentials as a way of getting privileged information from a user who might not be privy to the deception at hand.