Which of the following mitigation techniques can help prevent a high-jacked IM user account as a result of stolen account information through social engineering?

A. Disable the ability to send files through the system.
B. Teach users never to share their account password.
C. Teach users never to share their account name.
D. Purchase a product that uses encryption.

B
Explanation: Social engineering attacks that attempt to steal account passwords cannot succeed if users are taught to never share their IM password.

Computer Science & Information Technology

You might also like to view...

The first part of the instruction cycle is ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

When text automatically continues onto a following page, a hidden ________ marker is automatically inserted

A) hard page break B) soft return C) soft page break D) hard return

Computer Science & Information Technology