This method of attack is known as _________________.

CORRECT TEXT
Attackers have been known to search through company trash bins in order to collect potentially
useful information. This method of attack is known as _________________.

CORRECT TEXT
Attackers have been known to search through company trash bins in order to collect potentially
useful information. This method of attack is known as _________________.

Answer: Dumpster diving



Leave a Reply 0

Your email address will not be published. Required fields are marked *