List of questions
Related questions
Question 262 - CISM discussion
Which of the following is the BEST technical defense against unauthorized access to a corporate network through social engineering?
A.
Requiring challenge/response information
B.
Requiring multi factor authentication
C.
Enforcing frequent password changes
D.
Enforcing complex password formats
Your answer:
0 comments
Sorted by
Leave a comment first