Which of the following mitigation techniques can help prevent a high-jacked IM user account as a result of stolen account information through social engineering?
A. Disable the ability to send files through the system.
B. Teach users never to share their account password.
C. Teach users never to share their account name.
D. Purchase a product that uses encryption.
B
Explanation: Social engineering attacks that attempt to steal account passwords cannot succeed if users are taught to never share their IM password.
Computer Science & Information Technology
You might also like to view...
The first part of the instruction cycle is ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
When text automatically continues onto a following page, a hidden ________ marker is automatically inserted
A) hard page break B) soft return C) soft page break D) hard return
Computer Science & Information Technology