Users can authenticate to a company's web applications using their credentials from a popular social media site. Which of the following poses the greatest risk with this integration?
A. Malicious users can exploit local corporate credentials with their social media credentials
B. Changes to passwords on the social media site can be delayed from replicating to the company
C. Data loss from the corporate servers can create legal liabilities with the social media site
D. Password breaches to the social media site affect the company application as well
Answer: D. Password breaches to the social media site affect the company application as well
You might also like to view...
Unique to the ____________________ Lasso Tool options bar is a Contrast box to enter the contrast that Photoshop evaluates in making the path selection.
Fill in the blank(s) with the appropriate word(s).
What are the criteria for deciding whether a system should be prototyped?
What will be an ideal response?
A SmartArt layout type that illustrates a decision tree or creates an organization chart
A) Pyramid B) Relationship C) Hierarchy
The PMT function calculates the breakpoint of the lowest value for a specific category
Indicate whether the statement is true or false