PdfPrep.com

Which of the following BEST describe the vulnerabilities that exist in this environment?

After a security assessment was performed on the enterprise network, it was discovered that:

– Configuration changes have been made by users without the consent of IT.

– Network congestion has increased due to the use of social media.

– Users are accessing file folders and network shares that are beyond the scope of their need to know.

Which of the following BEST describe the vulnerabilities that exist in this environment? (Choose two.)
A . Poorly trained users
B . Misconfigured WAP settings
C . Undocumented assets
D . Improperly configured accounts
E . Vulnerable business processes

Answer: A,D

Exit mobile version