ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 6 - ECSS discussion

Report
Export

Alana, an employee in an organization, took a short break after spending exhausting hours on a project. For relaxation, she went to a cafeteria with her laptop, where she connected to the public Internet. While browsing the web, she received a project modifications file on her mail and reverted with another file that contained the required changes.

Which of the following BYOD risks has emerged from the above scenario?

A.

Mixing personal and private data

Answers
A.

Mixing personal and private data

B.

Endpoint security issue

Answers
B.

Endpoint security issue

C.

Improper disposing of devices

Answers
C.

Improper disposing of devices

D.

Sharing confidential data on unsecured networks

Answers
D.

Sharing confidential data on unsecured networks

Suggested answer: D

Explanation:

In the given scenario, Alana's actions pose a risk related tosharing confidential data on unsecured networks. Here's why:

BYOD (Bring Your Own Device): Alana used her personal laptop in a public cafeteria. This falls under the BYOD concept, where employees use their personal devices for work-related tasks.

Unsecured Network: Connecting to the public Internet in a cafeteria means she is using an unsecured network. Public Wi-Fi networks are often vulnerable to eavesdropping and unauthorized access.

Email Communication: Alana received a project modifications file via email and sent back another file with changes. Email communication over an unsecured network can expose sensitive information to potential attackers.

Risk: By sharing project-related files over an unsecured network, Alana risks exposing confidential data to unauthorized individuals.

EC-Council Certified Security Specialist (E|CSS) course materials and study guide.

EC-Council Certified Security Specialist (E|CSS) documents and course content12.

asked 24/10/2024
shafinaaz hossenny
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first