In cloud environments, what is the main challenge posed by 'Shadow IT'?
- Unauthorized adoption of unapproved apps
- Lack of scalability in cloud infrastructure
- Insufficient network bandwidth
- Inadequate encryption of data in transit
Shadow IT refers to the unauthorized adoption of unapproved apps and services within an organization's cloud environment. This poses a significant challenge as it can lead to security vulnerabilities and data breaches. Recognizing and addressing the issues related to Shadow IT is essential for maintaining control and ensuring the security of cloud environments.__________________________________________________
Loading...
Related Quiz
- During a security audit, it's discovered that an unauthorized device is connected to the company's Wi-Fi network. This could be due to a ____________ security lapse.
- Which term describes the process of testing patches on non-critical systems before a full-scale rollout?
- In SIEM, what is the role of correlation rules?
- Which of the following is a common type of malware that replicates itself to spread to other computers?
- A forensic analyst was able to recover parts of a deleted confidential document from a suspect's computer. This task demonstrates the application of ____________ in digital forensics.