?

Which of the following preventive controls are necessary to provide adequate security for social engineering threats?