Which of the following methods can be helpful to eliminate social engineering threat?
Each correct answer represents a complete solution. Choose three.
Password policies
Data classification
Vulnerability assessments
Data encryption
Submit