Which technique might an attacker employ to find documents that may reveal the true level of security within an organization?
A. Shoulder surfing
B. Dumpster diving
C. Vishing
D. Pretexting
Answer: B
Computer Science & Information Technology
You might also like to view...
How many arguments does the IIf function have?
A) 1 B) 2 C) 3 D) 4
Computer Science & Information Technology
Suppose we have created a class called MyGUI, which represents a GUI. Write a program that creates a JFrame object, adds a MyGUI object to the frame and makes it visible.
What will be an ideal response?
Computer Science & Information Technology