Your company recently had a breach of a server that resulted in intellectual property loss. Now the security team is looking for additional attack surfaces in the network that could lead to another such loss. Which of the following issues presents the greatest possibility of this type of loss again?

A. company laptops accessing social media sites through the guest wireless network
B. users accessing shopping sites on personal devices through the main network
C. users accessing the network through a VPN connection
D. guest users accessing the Internet on the guest wireless network


A
Explanation: When company laptops access social media sites from any network, there are two ways information could be lost. First, malware from a site could infect the system allowing access later through a back door. Secondly, users sometimes inadvertently reveal information on a social media site.

Computer Science & Information Technology

You might also like to view...

Which of the following lines would be the prototype for an overloaded cast operator function that converts an object of user-defined type Time into a double?

a. Time::operator double() const; b. Time::static_cast double() const; c. Time::operator_cast(double) const; d. Time::double() const;

Computer Science & Information Technology

Enterprise network solutions typically offer which of the following in comparison with smaller network solutions?

A) More features B) Additional throughput C) Advanced capabilities D) All of the above

Computer Science & Information Technology

Most of the time, you'll want to include a subset of the fields on a form.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If you would like to extend your Arduino project to add additional functionality you might have to add a ________ to your project

Fill in the blank(s) with correct word

Computer Science & Information Technology