The security administrator implemented privacy screens, password protected screen savers, and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate? (Select TWO).
A.
Whaling
B.
Dumpster diving
C.
Shoulder surfing
D.
Tailgating
E.
Impersonation