Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus ITS-110 Exam - Topic 1 Question 16 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 16
Topic #: 1
[All ITS-110 Questions]

A cloud developer for an IoT service is storing billing information. Which of the following should be considered a common vulnerability in regard to this data that could be used to compromise privacy?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Buddy
5 months ago
D should always be a priority, but it’s not always implemented properly.
upvoted 0 times
...
Michael
5 months ago
Wait, are people really not securing data in motion? That’s wild!
upvoted 0 times
...
Mariko
6 months ago
A is just a legal requirement, not a vulnerability.
upvoted 0 times
...
Micaela
6 months ago
I disagree, C is more concerning. Authorized access can still be misused.
upvoted 0 times
...
Sang
6 months ago
Definitely B, no data retention policies can lead to huge risks.
upvoted 0 times
...
Shelba
6 months ago
I'm leaning towards lack of data retention policies as a common vulnerability, but I could see how enabled notifications might also play a role in compliance issues.
upvoted 0 times
...
Nan
6 months ago
I practiced a similar question about data security, and I feel like secured data in motion and at rest is more about protection than vulnerability.
upvoted 0 times
...
Gwen
6 months ago
I think authorized access to personal information could be a big risk, especially if the access controls aren't strict enough.
upvoted 0 times
...
Coral
7 months ago
I remember discussing how lack of data retention policies can lead to vulnerabilities, but I'm not sure if that's the best answer here.
upvoted 0 times
...
Kimberlie
7 months ago
I'm a bit confused on this one. I'll need to review my notes to refresh my memory on the proper NE status for a newly commissioned NR base station.
upvoted 0 times
...
Nathan
7 months ago
I'm pretty confident the answer is A. The Latin square is more efficient in terms of data requirements, which is a key advantage over the more complex factorial design. I'll go with that unless I see something that makes me reconsider.
upvoted 0 times
...
Larae
7 months ago
Okay, let's see. A living will is about end-of-life decisions, not an oral will. And it's a written document, not an alternative to a trust. I'm pretty sure the answer is D, neither I nor II.
upvoted 0 times
...
Isadora
12 months ago
I can't believe they're even considering A as an option. Enabling notifications is a feature, not a vulnerability! The real issue is B - poor data retention policies.
upvoted 0 times
Irving
10 months ago
We need to make sure the data is secured in motion and at rest.
upvoted 0 times
...
Laurena
10 months ago
Yeah, lack of data retention policies is a real problem.
upvoted 0 times
...
Iola
11 months ago
I agree, enabling notifications is not a vulnerability.
upvoted 0 times
...
...
Delbert
12 months ago
Haha, I bet the developers are 'resting' pretty comfortably while the data is 'in motion' all over the place. D is definitely not the right choice here.
upvoted 0 times
Mari
11 months ago
User 3: Securing data in motion and at rest is crucial for protecting billing information.
upvoted 0 times
...
Farrah
11 months ago
User 2: Yeah, that could definitely lead to privacy issues.
upvoted 0 times
...
Paris
11 months ago
User 1: Lack of data retention policies is a big vulnerability.
upvoted 0 times
...
...
Nathan
1 year ago
C sounds like the right answer to me. Authorized access to personal info is a big vulnerability, even if the access is supposed to be legitimate.
upvoted 0 times
Salina
10 months ago
We should always be cautious about who has access to sensitive data.
upvoted 0 times
...
Stephaine
11 months ago
Definitely, even if the access is supposed to be legitimate.
upvoted 0 times
...
Ben
11 months ago
I agree, authorized access to personal info can be a big vulnerability.
upvoted 0 times
...
Graciela
11 months ago
C sounds like the right answer to me.
upvoted 0 times
...
Cristy
11 months ago
We should always be cautious about who has access to sensitive data.
upvoted 0 times
...
Devorah
11 months ago
Even if the access is supposed to be legitimate.
upvoted 0 times
...
Ellsworth
11 months ago
I agree, authorized access to personal info is a big vulnerability.
upvoted 0 times
...
Elise
12 months ago
C sounds like the right answer to me.
upvoted 0 times
...
...
Avery
1 year ago
But what about securing data in motion and at rest? Wouldn't that also be important to protect privacy?
upvoted 0 times
...
Dalene
1 year ago
I agree with Teri. Without proper data retention policies, sensitive billing information could be exposed.
upvoted 0 times
...
Shenika
1 year ago
Option A is a legal requirement, not a vulnerability. I think the correct answer is B - lack of data retention policies. That could lead to sensitive information being kept longer than necessary, increasing the risk of a breach.
upvoted 0 times
Lizbeth
12 months ago
B: Yeah, keeping sensitive information longer than necessary is definitely a risk.
upvoted 0 times
...
France
12 months ago
A: I think the correct answer is B - lack of data retention policies.
upvoted 0 times
...
...
Teri
1 year ago
I think lack of data retention policies could be a vulnerability.
upvoted 0 times
...
Karma
1 year ago
But what about securing data in motion and at rest? Wouldn't that also be important to protect privacy?
upvoted 0 times
...
Willodean
1 year ago
I agree with Elly. Without proper data retention policies, sensitive billing information could be exposed.
upvoted 0 times
...
Elly
1 year ago
I think lack of data retention policies could be a vulnerability.
upvoted 0 times
...

Save Cancel