Explain why a simple process like "dumpster diving" can be so effective when gathering information utilizing social engineering?
What will be an ideal response?
Although it's certainly not a glamorous form of gathering information, you'd be surprised at what you can find by examining someone's trash. For example, discarded computer manuals can indicate what OS is being used. If the discarded manual is for Windows Server 2012, there's a good chance the new system is a more recent Windows OS, such as Windows Server 2016. Sometimes network administrators write notes in manuals or even write down passwords; social engineers can make use of this information. Company calendars with meeting schedules, employee vacation schedules, and so on can be used to gain access to offices that won't be occupied for a specified period. Trash can be worth its weight in gold for the dumpster diver who knows what to do with it.
You might also like to view...
Case-based Critical Thinking QuestionsCase 12-1Casey is using XML to store information about the students in the science classes that he teaches. He wants to design a DTD that he can use to validate the XML documents that he uses for this purpose, and he comes to you for help. Casey needs to declare an "address" element that can be used to store a student's address. If he intends to store the address as parsed character data, which of the following is an appropriate declaration for this element?
A. B. C. D.
Write a recursive method that takes a String parameter and prints out the characters of the string in reverse order.
What will be an ideal response?
Which text box in the Paragraph Rules dialog box controls the vertical positioning of a rule above or below?
A. Baseline Shift B. Space Before C. Space After D. Offset
According to the text, for the ADT dictionary, what implementation should be used when you do not know the maximum size of the dictionary?
a. link-based b. array-based c. max-heap d. binary search tree