Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network.
Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.
A. Phishing
B. Malware
C. Reverse Social engineering
D. No change is needed
no underlined text