Bоb decides tо emplоy sociаl engineering during pаrt of his pen test. He sends аn unsolicited e-mail to several users on the network advising them of potential network problems and provides a phone number to call. Later that day, Bob performs a DoS on a network segment and then receives phone calls from users asking for assistance. Which social engineering practice is in play here?