Which of the following is the BEST mitigation from phishing attacks?
A. Network activity monitoring
B. Security awareness training
C. Corporate policy and procedures
D. Strong file and directory permissions
Which of the following is a physical security control that protects Automated Teller Machines (ATM) from skimming?
B. Secure card reader
C. Radio Frequency (RF) scanner
D. Intrusion Prevention System (IPS)