Question 26
What Is the root cause as to why SMS messages are open to attackers and abuse?
Question 27
What advantage does the delivery of online security training material have over the distribution of printed media?
Question 28
In a security governance framework, which of the following publications would be at the HIGHEST level?
Question 29
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
Question 30
What form of attack against an employee has the MOST impact on their compliance with the organisation's "code of conduct"?