This method of attack is known as _________________. seenagape 11 years ago CORRECT TEXTAttackers have been known to search through company trash bins in order to collect potentiallyuseful information. This method of attack is known as _________________. Answer: Dumpster diving ← Previous question Next question →