Which of the following might an attacker resort to in order to recover discarded company documents?

Which of the following might an attacker resort to in order to recover discarded company documents?

Which of the following might an attacker resort to in order to recover discarded company documents?

A.
Phishing

B.
Insider theft

C.
Dumpster diving

D.
Shoulder surfing



Leave a Reply 0

Your email address will not be published. Required fields are marked *