Which of the following may be effective countermeasures against social engineering? (Choose all that apply.)
a) Appropriately configured IDS
b) Operational guidelines
c) Security policies
d) Strong firewall configuration
e) User education and training