in Education by
Which of the following is the technique used to look for information in trash or around dustbin container? (a) Pretexting (b) Baiting (c) Quid Pro Quo (d) Dumpster diving The question was posed to me in unit test. This is a very interesting question from Social Engineering and Physical Hacking in chapter Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct answer is (d) Dumpster diving The best I can explain: In the technology world, where information about a person seems everywhere; dumpster diving is the name of the technique where the attacker looks for information in dustbins and trashes. For example, after withdrawing money from ATM, the user usually throw the receipt in which the total amount and account details are mentioned. These type of information becomes helpful to a hacker, for which they use dumpster diving.

Related questions

0 votes
    Which of the following is not a reconnaissance tool or technique for information gathering? (a) Hping (b) NMAP (c ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Whaling is the technique used to take deep and _________ information about any individual. (a) sensitive (b) powerful ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following is a non-technical type of intrusion or attack technique? (a) Reverse Engineering (b ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    ___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a technique used by spanners? (a) Spoofing the domain (b) Sending attached ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
0 votes
    ___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems ... and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
0 votes
0 votes
    Trojan creators do not look for _______________ (a) Credit card information (b) Confidential data (c) ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    ________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer ... and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
...