In an attempt to gain access to discarded company documents, which of the following social engineering attacks might a person implement?

In an attempt to gain access to discarded company documents, which of the following social engineering attacks might a person implement?




A. Phishing
B. Dumpster diving
C. Shoulder surfing
D. Identity theft


Answer: B. Dumpster diving


Learn More :