Watch this video on YouTube
Which scenario best describes a threat related to dumpster diving in the context of information security?