xecutive reports that she received a suspicious email concerning a sensitive internal project that is behind production. the email was sent from someone she doesn't know, and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. which type of attack best describes the scenario?