ISC Exam Questions

Attackers have been known to search through company trash bins in order to collect potentially usefu

Attackers have been known to search through company trash bins in order to collect potentially useful information. This method of attack is known as _________________.

Answer: Dumpster diving