ISC Exam Questions

Which of the following methods can be helpful to eliminate social engineering threat?

Which of the following methods can be helpful to eliminate social engineering threat? Each correct
answer represents a complete solution. Choose three.

A.
Password policies

B.
Vulnerability assessments

C.
Data encryption

D.
Data classification