Which of the following attacks can be mitigated by proper data retention policies?
A . Dumpster diving
B . Man-in-the-browser
C . Spear phishing
D . Watering hole
Answer: A
Which of the following attacks can be mitigated by proper data retention policies?
A . Dumpster diving
B . Man-in-the-browser
C . Spear phishing
D . Watering hole
Answer: A