Attackers have been known to search through company trash bins in order to collect potentially useful information. This method of attack is known as _________________.
Answer: Dumpster diving
Attackers have been known to search through company trash bins in order to collect potentially useful information. This method of attack is known as _________________.
Attackers have been known to search through company trash bins in order to collect potentially useful information. This method of attack is known as _________________.
Answer: Dumpster diving