You work as a technician with an IT-security responsibility at AIOTestKing.com. You have decided to inform the users at AIOTestKing.com about IT-Security and what to do to prevent security breaches. When talking about social engineering you want to use an example, which of the following would be most suitable?
A.
Adopting security audit procedures
B.
Getting user passwords by pretending to be help desk staff
C.
Requiring users to work in open office configurations
D.
Teaching users to change their passwords regularly