Training users to recognize social-engineering tactics assists in __________.

A. forensics management
B. disaster management
C. change management
D. risk management


Answer: D

Computer Science & Information Technology

You might also like to view...

An appointment ____________________ indicates how the time for a calendar item will be marked on your calendar.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The F2 and F3 special function keys

A) Are used to access the BIOS B) Are used to unlock the screen C) Are used for a specific task such as turn something on or off D) Increase and decrease system power to the motherboard

Computer Science & Information Technology

In a B-tree, at the end of a combine operation, the right subtree node is ____.

A. deleted B. recycled C. merged with its parent D. merged with a sibling

Computer Science & Information Technology

Briefly define malware and identify several examples.

What will be an ideal response?

Computer Science & Information Technology