Q: Which of the following would be considered a physical attack?
An attacker connecting to the same wireless network as you are
An attacker exploiting an SQL injection vulnerability
An attacker going through the garbage looking for confidential information