Training users to recognize social-engineering tactics assists in __________.

A. forensics management
B. disaster management
C. change management
D. risk management

Answer: D

Computer Science & Information Technology

You might also like to view...

Identify the statistical function used if the rank value returned for duplicate values was 8.5?

A) RANK B) RANK.EQ C) RANK.SP D) RANK.AVG

Computer Science & Information Technology

Which QoS quality issue is defined as an uneven arrival of packets into a receiver?

A) Jitter B) Delay C) Sway D) Flaps

Computer Science & Information Technology