When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always betaken into consideration?
A . Spear Phishing.
B . Shoulder Surfing.
C . Dumpster Diving.
D . Tailgating.
Answer: A
Latest CISMP-V9 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund