Answer:
Simulated Labs
Web-Based Educational Games
Discussion Forums
Explanation:
Did a test with the same question.
The answer is true because choosing a technology solution is the last step
Answer:
Social Engineering
Explanation:
Even if you invest in the best possible security infrastructure for your corporate network, you will still be vulnerable to attacks which exploit human shortcomings. An example is where an attacker manipulates a company employee to get the system access password in return for a favour. Now he can use the password to bypass all security infrastructure and gain access to critical data and code.
Answer:
application software or tailored software