An information attack that involves searching through a target organization's trash and recycling bins for sensitive information is known as __________.

A. rubbish surfing
B. social engineering
C. dumpster diving 
D. trash trolling


Answer: C

Computer Science & Information Technology

You might also like to view...

Elements that make up the database include tables, records, forms, and queries.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When few errors occur, protocols that use go-back-N continuous ARQ are more efficient than those that use stop-and-wait ARQ.

a. True b. False

Computer Science & Information Technology

If the player's guess is incorrect, your program should keep telling the player “Too high” or “Too low” to help the player “zero in” on the correct answer.

Write a program that plays the “guess the number” game as follows: Your program chooses the number to be guessed by selecting an Integer at random in the range 1 to 1000, then displays I have a number between 1 and 1000. Can you guess my number? Please enter your first guess. The player then types a first guess. The program responds with one of the following: Excellent! You guessed the number! Would you like to play again (y or n)? Too low. Try again. Too high. Try again.

Computer Science & Information Technology

Describe how the following function works: =DAY(TODAY())

What will be an ideal response?

Computer Science & Information Technology