An attacker went to a local bank and collected disposed paper for the purpose of collecting data that could be used to steal funds and information from the bank's customers. This is an example of:

A. Impersonation
B. Whaling
C. Dumpster diving
D. Hoaxes


Answer: C. Dumpster diving

Computer Science & Information Technology

You might also like to view...

________ are the conditions that users can set in a query to identify the specific records they want to return

A) Selection B) Search C) Criteria D) Sort

Computer Science & Information Technology

While Narrator is reading aloud the screen content, a _____ outline surrounds the portion of the screen that currently is being used.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is the correct port number for NTP?

A. 25 B. 69 C. 123 D. 161

Computer Science & Information Technology

The process giving someone the legal right to practice a profession is called

a. certification. b. licensing. c. matriculation. d. professional ethics. e. professional development.

Computer Science & Information Technology