CORRECT TEXT
Attackers have been known to search through company trash bins in order to collect potentially
useful information. This method of attack is known as _________________.
Answer: Dumpster diving
CORRECT TEXT
Attackers have been known to search through company trash bins in order to collect potentially
useful information. This method of attack is known as _________________.
CORRECT TEXT
Attackers have been known to search through company trash bins in order to collect potentially
useful information. This method of attack is known as _________________.
Answer: Dumpster diving