Which of the following statements explains the dumpster diving hacking technique?
A.
This is an information gathering technique in which the attacker runs a software program to
automatically call thousands of telephone numbers to find out a victim who has attached a modem
to the Internet.
B.
This is an information gathering technique in which an attacker rummages through all the
discarded waste-papers in the victim’s trash.
C.
This is an information gathering technique in which the attacker calls the help center of the
organization and asks someone to reset a password.
D.
This is an information gathering technique in which the attacker injects a Trojan in the victim’s
computer.
Explanation: