You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password.
What kind of threat is this?
In what part of the process to grant access to a system does the user present a token?
Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to?