What is a common tactic used in information theft?

Disable ads (and more) with a premium pass for a one time $4.99 payment

Prepare for the CompTIA ITF+ Certification Exam with flashcards and multiple choice questions. Understand key IT concepts and improve your skills with explanations at every step. Ensure your success with a comprehensive study approach.

Conducting dumpster diving for sensitive information is a common tactic used in information theft because it involves searching through trash or discarded materials to find sensitive documents or data that have not been securely destroyed. This method takes advantage of the fact that many organizations and individuals may not properly dispose of confidential information, such as financial records, identification numbers, or passwords. Thieves can retrieve this information without needing to use digital means, making it a low-tech but effective way to compromise security.

The other options listed, while important for cybersecurity and data protection, are not tactics used to carry out information theft. Regularly using antivirus software and employing SSL for secure transactions are preventive measures designed to protect against threats, while utilizing firewalls helps to block unauthorized access to networks. These practices contribute to securing sensitive information rather than being methods used to steal it.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy