Last Updated on April 28, 2021 by Admin
A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of access to cloud storage devices?
- intercepted emails that reveal confidential corporate or personal information
- the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software
- sensitive data lost through access to the cloud that has been compromised due to weak security settings
- the potential of causing great damage because of direct access to the building and its infrastructure devices