Which of the following is MOST effective in protecting against the attack technique known as
phishing?
A.
Firewall blocking rules
B.
Up-to-date signature files
C.
Security awareness training
D.
Intrusion detection monitoring
Explanation:
Phishing relies on social engineering techniques. Providing good security awareness training will
best reduce the likelihood of such an attack being successful. Firewall rules, signature files and
intrusion detection system (IDS) monitoring will be largely unsuccessful at blocking this kind of
attack.