Phishing is BEST mitigated by which of the following?

Posted by: Pdfprep Category: CISM Tags: , ,

Phishing is BEST mitigated by which of the following?
A . Security monitoring software
B . Encryption
C . Two-factor authentication
D . User awareness

Answer: D

Explanation:

Phishing can best be detected by the user. It can be mitigated by appropriate user awareness. Security monitoring software would provide some protection, but would not be as effective as user awareness. Encryption and two-factor authentication would not mitigate this threat.

Leave a Reply

Your email address will not be published.