Which of the following BEST describe the vulnerabilities that exist in this environment?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

After a security assessment was performed on the enterprise network, it was discovered that:

– Configuration changes have been made by users without the consent of IT.

– Network congestion has increased due to the use of social media.

– Users are accessing file folders and network shares that are beyond the scope of their need to know.

Which of the following BEST describe the vulnerabilities that exist in this environment? (Choose two.)
A . Poorly trained users
B . Misconfigured WAP settings
C . Undocumented assets
D . Improperly configured accounts
E . Vulnerable business processes

Answer: A,D

Leave a Reply

Your email address will not be published.