When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?

Posted by: Pdfprep Category: CPEH-001 Tags: , ,

When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?
A . Vulnerability scanning
B . Social engineering
C . Application security testing
D . Network sniffing

Answer: B

Leave a Reply

Your email address will not be published.