An information attack that involves searching through a target organization's trash and recycling bins for sensitive information is known as __________.

A. rubbish surfing
B. social engineering
C. dumpster diving 
D. trash trolling

Answer: C

Computer Science & Information Technology

You might also like to view...

To help maintain consistency in text and formats, ________ can be copied between documents

A) text boxes B) text C) merge fields D) Building blocks

Computer Science & Information Technology

The __________ communicates directly with hardware.

a. IOCS b. file system c. command processor d. all of the above

Computer Science & Information Technology