Certified Ethical Hacker – CEH – 312-50 – Question020

When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?


A.
Vulnerability scanning
B. Social engineering
C. Application security testing
D. Network sniffing

Correct Answer: B