What is the role of obfuscated links in social engineering attacks and their impact on IT security operations? (Select three.)
A) Concealing malicious URLs to evade detection by security software
B) Exploiting human curiosity or trust to entice users to click on deceptive links
C) Circumventing firewall restrictions to gain unauthorized access to sensitive data
D) Encrypting email content to prevent interception by malicious actors
E) Triggering automated system responses to overload network traffic
F) Installing malware onto a victim's device without their knowledge