An information security policy stating that “the display of passwords must be masked or suppressed” addresses which of the following attack methods? A、Piggybacking B、Dumpster diving C、Shoulder surfing D、Impersonation