Which of the following BEST describes the practice of dumpster diving?
A.
Sorting through the garbage of an organization to obtain information used for configuration management.
B.
Sorting through the garbage of an organization to obtain information used for a subsequent attack.
C.
Sorting through the trash of an organization to obtain information found on their intranet.
D.
Sorting through the trash of an organization to recover an old user ID badge previously used for an attack.