Ann a technician received a spear-phishing email asking her to update her personal information by clicking the link within the body of the email. Which of the following type of training would prevent Ann and other employees from becoming victims to such attacks?
A. User Awareness
B. Acceptable Use Policy
C. Personal Identifiable Information
D. Information Sharing
Answer: C. Personal Identifiable Information
You might also like to view...
Probably the most useful combination, ________ allows a process to send one or more messages to a variety of destinations as quickly as possible.
A) blocking send, blocking receive B) nonblocking send, blocking receive C) nonblocking send, nonblocking receive D) blocking send, nonblocking receive
For photographs, you should use ____ file compression.
A. lossy B. squeezy C. resizing D. lossless
Today's web browsers include a feature that will delete all of your browsing ________ with a single click.
A. history B. settings C. connections D. IPs
In Java, the ____ class does this comparison. It programmatically checks permissions and obtains the current Subject associated with the active access control context as well.
A. AccessPolicy B. ACLController C. AccessController D. AccessControlContext