which of the following steps of malicious hacking does dumpster diving come under?

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He is using dumpster diving to gather information about
Weare- secure, Inc. In which of the following steps of malicious hacking does dumpster diving
come under?

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He is using dumpster diving to gather information about
Weare- secure, Inc. In which of the following steps of malicious hacking does dumpster diving
come under?

A.
Gaining access

B.
Scanning

C.
Maintaining access

D.
Reconnaissance

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *