Training users to recognize social-engineering tactics assists in __________.
A. forensics management
B. disaster management
C. change management
D. risk management
Answer: D
Computer Science & Information Technology
You might also like to view...
Identify the statistical function used if the rank value returned for duplicate values was 8.5?
A) RANK B) RANK.EQ C) RANK.SP D) RANK.AVG
Computer Science & Information Technology
Which QoS quality issue is defined as an uneven arrival of packets into a receiver?
A) Jitter B) Delay C) Sway D) Flaps
Computer Science & Information Technology