When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would
be most effective in determining whether end-user security training would be beneficial?
A. Vulnerability scanning
B. Social engineering
C. Application security testing
D. Network sniffing