Which of the following should an IS auditor recommend to reduce the likelihood of potential intruders using social engineering?
A. Perform simulated attacks.
B. Prohibit the use of social networking platforms.
C. Implement an intrusion detection system (IDS).
D. Deploy a security awareness program.
A. Perform simulated attacks.
B. Prohibit the use of social networking platforms.
C. Implement an intrusion detection system (IDS).
D. Deploy a security awareness program.