What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?

A. shoulder-surfing
B. dumpster diving
C. piggybacking
D. desk surfing


Answer: B

Computer Science & Information Technology

You might also like to view...

Define quantization and describe the process.

What will be an ideal response?

Computer Science & Information Technology

Which of the following is NOT a Windows 10 backup and recovery tool?

A) PC Reset B) File History C) Defender D) System image backup

Computer Science & Information Technology

A smaller portion of the population that is easier to evaluate.

What will be an ideal response?

Computer Science & Information Technology

In C# the length of an array cannot be changed. After it is instantiated with a length, dynamic resizing is not an option.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology