An information attack that involves searching through a target organization's trash and recycling bins for sensitive information is known as __________.
A. rubbish surfing
B. social engineering
C. dumpster diving
D. trash trolling
Answer: C
Computer Science & Information Technology
You might also like to view...
To help maintain consistency in text and formats, ________ can be copied between documents
A) text boxes B) text C) merge fields D) Building blocks
Computer Science & Information Technology
The __________ communicates directly with hardware.
a. IOCS b. file system c. command processor d. all of the above
Computer Science & Information Technology