Users can authenticate to a company's web applications using their credentials from a popular social media site. Which of the following poses the greatest risk with this integration?

A. Malicious users can exploit local corporate credentials with their social media credentials
B. Changes to passwords on the social media site can be delayed from replicating to the company
C. Data loss from the corporate servers can create legal liabilities with the social media site
D. Password breaches to the social media site affect the company application as well


Answer: D. Password breaches to the social media site affect the company application as well

Computer Science & Information Technology

You might also like to view...

Unique to the ____________________ Lasso Tool options bar is a Contrast box to enter the contrast that Photoshop evaluates in making the path selection.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What are the criteria for deciding whether a system should be prototyped?

What will be an ideal response?

Computer Science & Information Technology

A SmartArt layout type that illustrates a decision tree or creates an organization chart

A) Pyramid B) Relationship C) Hierarchy

Computer Science & Information Technology

The PMT function calculates the breakpoint of the lowest value for a specific category

Indicate whether the statement is true or false

Computer Science & Information Technology