After a security assessment was performed on the enterprise network, it was discovered that:
1. Configuration changes have been made by users without the consent of IT.
2. Network congestion has increased due to the use of social media.
3. Users are accessing file folders and network shares that are beyond the scope of their need to know.
Which of the following BEST describe the vulnerabilities that exist in this environment? (Choose two.)
The_Temp
Highly Voted 5 years, 2 months agoThe_Temp
5 years, 2 months agoFNavarro
4 years, 3 months agoTzu
5 years, 2 months agoFNavarro
4 years, 3 months agoHeymannicerouter
4 years, 2 months agoMat_2019
Highly Voted 5 years, 7 months agohy_n_bkhool
Most Recent 3 years, 10 months agoFunkydave
4 years, 2 months agoleesuh
4 years, 2 months agoMiltduhilt
4 years, 4 months agobabati
4 years, 10 months agononee
4 years, 11 months agoMobeus
5 years, 3 months ago