A network resource was accessed by an outsider as a result of a successful phishing campaign. Which of the
following strategies should be employed to mitigate the effects of phishing?
A. Multifactor authentication
B. Single sign-on
C. RADIUS
D. VPN
following strategies should be employed to mitigate the effects of phishing?
A. Multifactor authentication
B. Single sign-on
C. RADIUS
D. VPN