Questions Bank
People first, technology second
Technology first, people second
None of these
All of these
Hactivist
Social engineering
Insiders
Virus
Information security plan
Information security policies
Authentication
Biometrics
Develop the information security policies
Communicate the information security policies
Revise and test the information security policies
None of these
Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
Small electronic devices that change user passwords automatically
A method for confirming user's identities