What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?

A. shoulder-surfing
B. dumpster diving
C. piggybacking
D. desk surfing

Answer: B

Computer Science & Information Technology

You might also like to view...

The ________ is used to type programming code in Microsoft Visual Basic

Fill in the blank(s) with correct word

Computer Science & Information Technology

Show the average cost of a course with no prerequisites (1195)

What will be an ideal response?

Computer Science & Information Technology