Which technique might an attacker employ to find documents that may reveal the true level of security within an organization?

A. Shoulder surfing
B. Dumpster diving
C. Vishing
D. Pretexting

Answer: B

Computer Science & Information Technology

You might also like to view...

How many arguments does the IIf function have?

A) 1 B) 2 C) 3 D) 4

Computer Science & Information Technology

Suppose we have created a class called MyGUI, which represents a GUI. Write a program that creates a JFrame object, adds a MyGUI object to the frame and makes it visible.

What will be an ideal response?

Computer Science & Information Technology