Phishing is BEST mitigated by which of the following?
A . Security monitoring software
B . Encryption
C . Two-factor authentication
D . User awareness
Answer: D
Explanation:
Phishing can best be detected by the user. It can be mitigated by appropriate user awareness. Security monitoring software would provide some protection, but would not be as effective as user awareness. Encryption and two-factor authentication would not mitigate this threat.