Cryptography MCSY0-401In an attempt to gain access to discarded company documents, which of the following social engineering attacks might a person implement?
In an attempt to gain access to discarded company documents, which of the following social engineering attacks might a person implement?