Attackers have been known to search through company trash bins in order to collect potentially useful information

Attackers have been known to search through company trash bins in order to collect potentially useful information. This method of attack is known as _________________.

Attackers have been known to search through company trash bins in order to collect potentially useful information. This method of attack is known as _________________.

Answer: Dumpster diving



Leave a Reply 0

Your email address will not be published. Required fields are marked *