Which of the following ways will Mark use for educating his team members on the social engineering process?

Mark works as a Security Administrator for TechMartInc. The company has a a Windows-based network. Mark has gone through a security audit for ensuring thatthe technical system is secure and protected. While this audit, he identified many areas that need improvement. He wants to minimize the risk for potential security threats by educating team members in the area of social engineering, and providing basic security principle knowledge while stressing the Condentiality, Integrity, and Availability triangle in the training of his team members .
Which of the following ways will Mark use for educating his team members on the social engineering process?

Mark works as a Security Administrator for TechMartInc. The company has a a Windows-based network. Mark has gone through a security audit for ensuring thatthe technical system is secure and protected. While this audit, he identified many areas that need improvement. He wants to minimize the risk for potential security threats by educating team members in the area of social engineering, and providing basic security principle knowledge while stressing the Condentiality, Integrity, and Availability triangle in the training of his team members .
Which of the following ways will Mark use for educating his team members on the social engineering process?

A.
He will call a team member while behaving to be someone else for gaining access to sensitive information.

B.
He will use group policies to disable the use of floppy drives or USB drives.

C.
He will develop a social awareness of security threats within an organization.

D.
He will protect against a Distributed Denial of Services attack.



Leave a Reply 0

Your email address will not be published. Required fields are marked *