PdfPrep.com

When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?

When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?
A . Vulnerability scanning
B . Social engineering
C . Application security testing
D . Network sniffing

Answer: B

Exit mobile version