PdfPrep.com

Which of the following attacks can be mitigated by proper data retention policies?

Which of the following attacks can be mitigated by proper data retention policies?
A . Dumpster diving
B . Man-in-the-browser
C . Spear phishing
D . Watering hole

Answer: A

Exit mobile version