Users can authenticate to a company's web applications using their credentials form a popular social media site. Which of the following poses the greatest risk with this integration?

A. Malicious users can exploit local corporate credentials with their social media credentials
B. Changes to passwords on the social media site can be delayed from replicating to the company
C. Data loss from the corporate servers can create legal liabilities with the social media site
D. Password breaches to the social media affect the company application as well

Answer: D. Password breaches to the social media affect the company application as well

Computer Science & Information Technology

You might also like to view...

If you have data that is organized into more than one column–not counting labels–use a ________ chart to compare values in the columns

A) column B) line C) bar D) clustered column

Computer Science & Information Technology

Since the first Copyright Act was passed in 1790

a. Congress has repeatedly increased the number of years of copyright protection. b. Congress has made more kinds of intellectual property protected under copyright. c. Congress has attempted to reconcile American copyright law with European copyright law. d. All of the above e. None of the above

Computer Science & Information Technology