In addition to bribery and forgery, which of the following are the most common techniques that attackers use to socially engineer people?
1) Phishing
2) Impersonation
3) Vishing
4) Malware
5) Distributed Denial of Service (DDoS)