Your company recently had a breach of a server that resulted in intellectual property loss. Now the security team is looking for additional attack surfaces in the network that could lead to another such loss. Which of the following issues presents the greatest possibility of this type of loss again?
A. company laptops accessing social media sites through the guest wireless network
B. users accessing shopping sites on personal devices through the main network
C. users accessing the network through a VPN connection
D. guest users accessing the Internet on the guest wireless network
A
Explanation: When company laptops access social media sites from any network, there are two ways information could be lost. First, malware from a site could infect the system allowing access later through a back door. Secondly, users sometimes inadvertently reveal information on a social media site.
You might also like to view...
Which of the following lines would be the prototype for an overloaded cast operator function that converts an object of user-defined type Time into a double?
a. Time::operator double() const; b. Time::static_cast double() const; c. Time::operator_cast(double) const; d. Time::double() const;
Enterprise network solutions typically offer which of the following in comparison with smaller network solutions?
A) More features B) Additional throughput C) Advanced capabilities D) All of the above
Most of the time, you'll want to include a subset of the fields on a form.
Answer the following statement true (T) or false (F)
If you would like to extend your Arduino project to add additional functionality you might have to add a ________ to your project
Fill in the blank(s) with correct word