List of questions
Related questions
Question 15 - 112-51 discussion
Amber is working as a team lead in an organization. She was instructed to share a policy document with all the employees working from remote locations and collect them after filling. She shared the files from her mobile device to the concerned employees through the public Internet. An unauthorized user accessed the file in transit, modified the file, and forwarded it to the remote employees.
Based on the above scenario, identify the security risk associated with mobile usage policies.
A.
Lost or stolen devices
B.
Infrastructure issues
C.
Improperly disposing of devices
D.
Sharing confidential data on an unsecured network
Your answer:
0 comments
Sorted by
Leave a comment first