An attack in which an authentic-looking e-mail or website entices a user to enter his or her username, password, or other sensitive information is called ________. (Select the most specific answer.) A- a spyware attack B-identity theft C- phishing D- social engineering A- a spyware attack B-identity theft C- phishing D- social engineering Solution C - phishing , is the method that attackers use to get login credentials and other sensitive information by sending emails that resemble original login authentication procedure..