Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam ITS-110 Topic 1 Question 16 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 16
Topic #: 1
[All ITS-110 Questions]

A cloud developer for an IoT service is storing billing information. Which of the following should be considered a common vulnerability in regard to this data that could be used to compromise privacy?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Dalene
2 days ago
I agree with Teri. Without proper data retention policies, sensitive billing information could be exposed.
upvoted 0 times
...
Shenika
2 days ago
Option A is a legal requirement, not a vulnerability. I think the correct answer is B - lack of data retention policies. That could lead to sensitive information being kept longer than necessary, increasing the risk of a breach.
upvoted 0 times
...
Teri
3 days ago
I think lack of data retention policies could be a vulnerability.
upvoted 0 times
...
Karma
5 days ago
But what about securing data in motion and at rest? Wouldn't that also be important to protect privacy?
upvoted 0 times
...
Willodean
6 days ago
I agree with Elly. Without proper data retention policies, sensitive billing information could be exposed.
upvoted 0 times
...
Elly
13 days ago
I think lack of data retention policies could be a vulnerability.
upvoted 0 times
...

Save Cancel