Which of the following methods should the company use to gauge its own social media threat level without targeting individual employees?

A company’s Chief Operating Officer (COO) is concerned about the potential for competitors to infer proprietary information gathered from employees’ social media accounts.
Which of the following methods should the company use to gauge its own social media threat level without targeting individual employees?
A. Utilize insider threat consultants to provide expertise.
B. Require that employees divulge social media accounts.
C. Leverage Big Data analytical algorithms.
D. Perform social engineering tests to evaluate employee awareness.

How to PASS CAS-004 in First Attempt?

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

4 thoughts on “Which of the following methods should the company use to gauge its own social media threat level without targeting individual employees?

  1. A.
    The biggest thing that the books talk about is having a “Social Media Policy” – which seems to me would be the quickest best way to mitigate the problem. This question asks, though, about methods the company should use to gauge its own threat level. So – yeah, maybe leverage “big data analytical algorithms” – but who has that expertise in-house? Asking for social media accounts from everyone is likely to create a rebellion – particularly without training, the aforementioned policy, etc., and then there’s the “social engineering testing” that is proposed, which I think best performed by the PENTEST group that one would hire. This leaves A – Insider threat consultants – They are easy to find, they do this for businesses, they can provide an excellent insider threat profile and social media is something they look at. I’ll go with A.

  2. without targeting individual employees. so either the whole company or none. it’s C

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.