Which of the following is a best practice to prevent users from being vulnerable to social engineering?
A.
Have a solid acceptable use policy in place with a click through banner.
B.
Provide thorough and frequent user awareness training.
C.
Have user sign both the acceptable use policy and security based HR policy.
D.
Provide a service level agreement that addresses social engineering issues.