Which of the following mitigation techniques would be used in order to defend against social engineering?
A.
Updating antivirus definitions
B.
Implementing patch management solutions
C.
Enabling audit logs on all workstations
D.
Revising security and network policies