Last Updated on April 28, 2021 by Admin
A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of access to cloud storage devices?
- intercepted emails that reveal confidential corporate or personal information
- gaining illegal access to corporate data by stealing passwords or cracking weak passwords
- sensitive data lost through access to the cloud that has been compromised due to weak security settings
- the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software