An attacker went to a local bank and collected disposed paper for the purpose of collecting data that could be used to steal funds and information from the bank's customers. This is an example of:
A. Impersonation
B. Whaling
C. Dumpster diving
D. Hoaxes
Answer: C. Dumpster diving
Computer Science & Information Technology
You might also like to view...
________ are the conditions that users can set in a query to identify the specific records they want to return
A) Selection B) Search C) Criteria D) Sort
Computer Science & Information Technology
While Narrator is reading aloud the screen content, a _____ outline surrounds the portion of the screen that currently is being used.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following is the correct port number for NTP?
A. 25 B. 69 C. 123 D. 161
Computer Science & Information Technology
The process giving someone the legal right to practice a profession is called
a. certification. b. licensing. c. matriculation. d. professional ethics. e. professional development.
Computer Science & Information Technology