New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus ITS-110 Exam - Topic 1 Question 16 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 16
Topic #: 1
[All ITS-110 Questions]

A cloud developer for an IoT service is storing billing information. Which of the following should be considered a common vulnerability in regard to this data that could be used to compromise privacy?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Buddy
3 months ago
D should always be a priority, but it’s not always implemented properly.
upvoted 0 times
...
Michael
4 months ago
Wait, are people really not securing data in motion? That’s wild!
upvoted 0 times
...
Mariko
4 months ago
A is just a legal requirement, not a vulnerability.
upvoted 0 times
...
Micaela
4 months ago
I disagree, C is more concerning. Authorized access can still be misused.
upvoted 0 times
...
Sang
4 months ago
Definitely B, no data retention policies can lead to huge risks.
upvoted 0 times
...
Shelba
5 months ago
I'm leaning towards lack of data retention policies as a common vulnerability, but I could see how enabled notifications might also play a role in compliance issues.
upvoted 0 times
...
Nan
5 months ago
I practiced a similar question about data security, and I feel like secured data in motion and at rest is more about protection than vulnerability.
upvoted 0 times
...
Gwen
5 months ago
I think authorized access to personal information could be a big risk, especially if the access controls aren't strict enough.
upvoted 0 times
...
Coral
5 months ago
I remember discussing how lack of data retention policies can lead to vulnerabilities, but I'm not sure if that's the best answer here.
upvoted 0 times
...
Kimberlie
5 months ago
I'm a bit confused on this one. I'll need to review my notes to refresh my memory on the proper NE status for a newly commissioned NR base station.
upvoted 0 times
...
Nathan
5 months ago
I'm pretty confident the answer is A. The Latin square is more efficient in terms of data requirements, which is a key advantage over the more complex factorial design. I'll go with that unless I see something that makes me reconsider.
upvoted 0 times
...
Larae
5 months ago
Okay, let's see. A living will is about end-of-life decisions, not an oral will. And it's a written document, not an alternative to a trust. I'm pretty sure the answer is D, neither I nor II.
upvoted 0 times
...
Isadora
10 months ago
I can't believe they're even considering A as an option. Enabling notifications is a feature, not a vulnerability! The real issue is B - poor data retention policies.
upvoted 0 times
Irving
9 months ago
We need to make sure the data is secured in motion and at rest.
upvoted 0 times
...
Laurena
9 months ago
Yeah, lack of data retention policies is a real problem.
upvoted 0 times
...
Iola
9 months ago
I agree, enabling notifications is not a vulnerability.
upvoted 0 times
...
...
Delbert
10 months ago
Haha, I bet the developers are 'resting' pretty comfortably while the data is 'in motion' all over the place. D is definitely not the right choice here.
upvoted 0 times
Mari
9 months ago
User 3: Securing data in motion and at rest is crucial for protecting billing information.
upvoted 0 times
...
Farrah
9 months ago
User 2: Yeah, that could definitely lead to privacy issues.
upvoted 0 times
...
Paris
9 months ago
User 1: Lack of data retention policies is a big vulnerability.
upvoted 0 times
...
...
Nathan
11 months ago
C sounds like the right answer to me. Authorized access to personal info is a big vulnerability, even if the access is supposed to be legitimate.
upvoted 0 times
Salina
9 months ago
We should always be cautious about who has access to sensitive data.
upvoted 0 times
...
Stephaine
9 months ago
Definitely, even if the access is supposed to be legitimate.
upvoted 0 times
...
Ben
9 months ago
I agree, authorized access to personal info can be a big vulnerability.
upvoted 0 times
...
Graciela
9 months ago
C sounds like the right answer to me.
upvoted 0 times
...
Cristy
9 months ago
We should always be cautious about who has access to sensitive data.
upvoted 0 times
...
Devorah
9 months ago
Even if the access is supposed to be legitimate.
upvoted 0 times
...
Ellsworth
10 months ago
I agree, authorized access to personal info is a big vulnerability.
upvoted 0 times
...
Elise
10 months ago
C sounds like the right answer to me.
upvoted 0 times
...
...
Avery
11 months ago
But what about securing data in motion and at rest? Wouldn't that also be important to protect privacy?
upvoted 0 times
...
Dalene
11 months ago
I agree with Teri. Without proper data retention policies, sensitive billing information could be exposed.
upvoted 0 times
...
Shenika
11 months ago
Option A is a legal requirement, not a vulnerability. I think the correct answer is B - lack of data retention policies. That could lead to sensitive information being kept longer than necessary, increasing the risk of a breach.
upvoted 0 times
Lizbeth
10 months ago
B: Yeah, keeping sensitive information longer than necessary is definitely a risk.
upvoted 0 times
...
France
10 months ago
A: I think the correct answer is B - lack of data retention policies.
upvoted 0 times
...
...
Teri
11 months ago
I think lack of data retention policies could be a vulnerability.
upvoted 0 times
...
Karma
11 months ago
But what about securing data in motion and at rest? Wouldn't that also be important to protect privacy?
upvoted 0 times
...
Willodean
11 months ago
I agree with Elly. Without proper data retention policies, sensitive billing information could be exposed.
upvoted 0 times
...
Elly
11 months ago
I think lack of data retention policies could be a vulnerability.
upvoted 0 times
...

Save Cancel