After a security assessment was performed on the enterprise network, it was discovered that: Configuration changes have been made by users without the consent of IT. Network congestion has increased due to the use of social media. Users are accessing file folders and network shares that are beyond the scope of their need to know. Which of the following BEST describe the vulnerabilities that exist in this environment? (Choose two.)
A) Poorly trained users
B) Misconfigured WAP settings
C) Undocumented assets
D) Improperly configured accounts
E) Vulnerable business processes
Correct Answer:
Verified
Q962: An organization hosts a public-facing website that
Q963: A security administrator needs an external vendor
Q964: A security administrator has completed a monthly
Q965: Upon learning about a user who has
Q966: Which of the following penetration testing concepts
Q968: A company has three divisions, each with
Q969: Which of the following would provide additional
Q970: Security administrators attempted corrective action after a
Q971: A company recently experienced data exfiltration via
Q972: Which of the following are used to
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents