An IS auditor is evaluating networked devices at one of the organization's branch locations.
Which of the following observations should be of GREATEST concern?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
The IS auditor's primary concern is to ensure the security of the organization's network, devices, and data. Given the options provided, the IS auditor should be most concerned with option B - A local executive has a wireless-enabled fish tank connected to the corporate network.
Option A - Personal devices are required to connect wirelessly to a guest network: This option suggests that personal devices are connected to a separate guest network, which is a common security practice to keep personal devices separate from the corporate network. As long as the guest network is secure, and proper access controls are in place, this is not a significant concern.
Option C - Company laptops with built-in cameras are observed with opaque tape blocking the cameras: This option indicates that company laptops with built-in cameras have opaque tape blocking the camera. Although it is an unusual practice, it is not necessarily a security concern. The purpose of the tape is to prevent unauthorized access to the camera, which could be used for espionage or other malicious purposes.
Option D - Four personal laptops with default passwords are connected to the corporate network: This option suggests that personal laptops with default passwords are connected to the corporate network, which is a severe security concern. Default passwords are easy to guess, and if these laptops are connected to the corporate network, they could be compromised and used to gain access to sensitive corporate data.
Option B - A local executive has a wireless-enabled fish tank connected to the corporate network: This option is the most concerning because it suggests that a wireless-enabled fish tank is connected to the corporate network. The fish tank could be used as a potential entry point for hackers to access the network. The fish tank could be used as a backdoor to access the network as it might be running outdated software or have weak credentials that could be exploited by an attacker.
In summary, the IS auditor should be most concerned with option B - A local executive has a wireless-enabled fish tank connected to the corporate network, as it could serve as an entry point for an attacker to compromise the corporate network.