which of the following is commonly used by computer criminals to exploit human weaknesses by misrepresenting oneself to trick others into revealing information?