New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

BCS TM12 Exam - Topic 2 Question 24 Discussion

Actual exam question for BCS's TM12 exam
Question #: 24
Topic #: 2
[All TM12 Questions]

You are working on a project to develop an authentication system for an e-commerce website. This system provides two features: Registration and authentication. Two different development teams develop these two features.

There is a high likelihood that the delivery of the authentication feature to the test team will be three weeks later. To complete the registration the user must provide the following registration inputs: Name, surname, birthdate, fiscal code and he/she can select a username and a password.

A registered user can be a special user or a normal user. To be identified as a special user, he/she must also provide, during the registration process, a voucher possibly received from the IT department.

Access is granted only if a user is registered and the password is correct: In all other cases access is denied. If the registered user is a special user and the password is wrong, a special warning is shown on the system console.

You are currently performing a quality risk analysis using FMEA.

Based only on the given information, which of the following is NOT a product risk that could be identified during the quality risk analysis?

Number of correct responses: 1

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Glory
4 months ago
If a normal user gets in with a wrong password, that's a huge issue!
upvoted 0 times
...
Ashlee
4 months ago
I think option A is not a product risk, it's more of a project risk.
upvoted 0 times
...
Ira
4 months ago
Wait, why would a special user get access with a wrong password?
upvoted 0 times
...
Phil
4 months ago
Totally agree, that could complicate things for users.
upvoted 0 times
...
Johnna
5 months ago
The registration needs a fiscal code, that's interesting.
upvoted 0 times
...
Daren
5 months ago
This looks like a straightforward compliance monitoring question. I'd start by reviewing the requirements carefully and identifying the key services that can address each one.
upvoted 0 times
...
Tresa
5 months ago
Hmm, I'm a little confused about the process here. I think the next step is to finalize the targeted installation using the application layering software, but I'm not 100% sure.
upvoted 0 times
...
Chantell
5 months ago
This seems like a straightforward question about UPS battery backup duration. I'll need to think about the typical use cases and power requirements to determine the best answer.
upvoted 0 times
...
Fidelia
5 months ago
Okay, let's think this through step-by-step. I know I'll need the application ID, application secret, and redirect URI to get the token. I just need to double-check the other two properties.
upvoted 0 times
...

Save Cancel