ISC Exam Questions

This method of attack is known as _________________.

CORRECT TEXT
Attackers have been known to search through company trash bins in order to collect potentially
useful information. This method of attack is known as _________________.

Answer: Dumpster diving