Ann a technician received a spear-phishing email asking her to update her personal information by clicking the link within the body of the email. Which of the following type of training would prevent Ann and other employees from becoming victims to such attacks?

A. User Awareness
B. Acceptable Use Policy
C. Personal Identifiable Information
D. Information Sharing


Answer: C. Personal Identifiable Information

Computer Science & Information Technology

You might also like to view...

Probably the most useful combination, ________ allows a process to send one or more messages to a variety of destinations as quickly as possible.

A) blocking send, blocking receive B) nonblocking send, blocking receive C) nonblocking send, nonblocking receive D) blocking send, nonblocking receive

Computer Science & Information Technology

For photographs, you should use ____ file compression.

A. lossy B. squeezy C. resizing D. lossless

Computer Science & Information Technology

Today's web browsers include a feature that will delete all of your browsing ________ with a single click.

A. history B. settings C. connections D. IPs

Computer Science & Information Technology

In Java, the ____ class does this comparison. It programmatically checks permissions and obtains the current Subject associated with the active access control context as well.

A. AccessPolicy B. ACLController C. AccessController D. AccessControlContext

Computer Science & Information Technology