When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always betaken into consideration?
When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always betaken into consideration?
A . Spear Phishing.
B . Shoulder Surfing.
C . Dumpster Diving.
D . Tailgating.
Answer: A
Latest CISMP-V9 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments