John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He is using dumpster diving to gather information about
Weare- secure, Inc. In which of the following steps of malicious hacking does dumpster diving
come under?
A.
Gaining access
B.
Scanning
C.
Maintaining access
D.
Reconnaissance
Explanation: