Your company has recently adopted a new social media policy that allows members of the marketing department to post important company news, product updates, and special promotions on social websites. The initial pilot period is over, and the project considered a success across the organization. Now, the human resources department wants to use social websites to provide their updates as well,

including job listings, benefits changes, and so on. The CSO has asked you to document negative security impacts of allowing the human resources staff to post their updates as well. Which of the following are the major risks you should report back to the CSO?

A. brute force attacks, DDoS attacks, and SQL injection attacks
B. malware infection, phishing attacks, and social engineering attacks
C. DoS attacks, dictionary attacks, and buffer overflow attacks
D. wardriving attacks, spoofing attacks, and shoulder surfing


B
Explanation: The major risks of allowing human resources staff (or any other staff) to post their updates include: malware infection, phishing attacks, and social engineering attacks.
None of the other listed attacks occur as a result of allowing social media usage.

Computer Science & Information Technology

You might also like to view...

The On Dirty event is triggered when the file is being edited

Indicate whether the statement is true or false

Computer Science & Information Technology

A 3-D reference is a reference to the same cell or range in multiple worksheets that you use in a formula.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is not a recommended test case for sorting?

A. A nearly ordered list B. A random list C. A permutation list D. An ordered ascending list E. An ordered descending list

Computer Science & Information Technology

If there exists a class named Person and one wants to create a new class named Student based on the Person class, what code segment below shows the correct way to do so?

a. Public Class Student Inherits Person b. Public Class Student Extends Person c. Public Class Student Inherits From Person d. Public Class Student :Person

Computer Science & Information Technology