You may throw some confidential file in a dustbin which contains some of your personal data. Hackers can take your data from that thrown-away file also, using the technique _________
(a) Dumpster diving
(b) Shoulder surfing
(c) Phishing
(d) Spamming
This question was posed to me in unit test.
This interesting question is from How Security Breach Takes Place topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security