Which of the following attacks can be mitigated by proper data retention policies?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

Which of the following attacks can be mitigated by proper data retention policies?
A . Dumpster diving
B . Man-in-the-browser
C . Spear phishing
D . Watering hole

Answer: A

Leave a Reply

Your email address will not be published.