Your company recently had a breach of a server that resulted in intellectual property loss. Now the security team is looking for additional attack surfaces in the network that could lead to another such loss. Which of the following issues presents the greatest possibility of this type of loss again?

A. company laptops accessing social media sites through the guest wireless network
B. users accessing shopping sites on personal devices through the main network
C. users accessing the network through a VPN connection
D. guest users accessing the Internet on the guest wireless network

A
Explanation: When company laptops access social media sites from any network, there are two ways information could be lost. First, malware from a site could infect the system allowing access later through a back door. Secondly, users sometimes inadvertently reveal information on a social media site.

Computer Science & Information Technology

You might also like to view...

______ time is the amount of time it takes the processor to read data, instructions, and information from memory.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When might a nonauthoritative AD restore be performed?

What will be an ideal response?

Computer Science & Information Technology