New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CIMAPRA19-P03-1 Exam - Topic 6 Question 27 Discussion

Actual exam question for CIMA's CIMAPRA19-P03-1 exam
Question #: 27
Topic #: 6
[All CIMAPRA19-P03-1 Questions]

ABC is an online retail chain which operates on a 24/7 basis It has been updating its Cyber Security processes and has implemented a centralised monitoring process to track activity through its web access portal

Which of the following activities will increase the awareness of its cyber security risk most effectively?

Show Suggested Answer Hide Answer
Suggested Answer: A, B, D

Contribute your Thoughts:

0/2000 characters
Santos
4 months ago
Wait, they want to track every keystroke? That's extreme!
upvoted 0 times
...
Maddie
4 months ago
Failed access attempts are definitely key to understanding threats!
upvoted 0 times
...
Shenika
4 months ago
Out of hours access could reveal a lot of risks.
upvoted 0 times
...
Truman
4 months ago
Not sure about tracking every keystroke, feels invasive.
upvoted 0 times
...
Whitney
4 months ago
Monitoring every device type is a smart move!
upvoted 0 times
...
Sharee
5 months ago
Monitoring every keystroke seems excessive and could raise privacy concerns. I wonder if that would actually increase awareness or just create more issues.
upvoted 0 times
...
Myra
5 months ago
I practiced a similar question where tracking device types was emphasized, but I feel like that might not directly raise awareness as much as monitoring failed attempts.
upvoted 0 times
...
Janey
5 months ago
I think monitoring out of hours access is important too, especially since it could indicate unauthorized activity. I just can't recall if it's the best choice here.
upvoted 0 times
...
Johnetta
5 months ago
I remember we discussed how monitoring failed access attempts could help identify potential threats, but I'm not sure if it's the most effective method overall.
upvoted 0 times
...
Vivienne
5 months ago
This seems like a tricky situation for Company C. I'd need to carefully analyze the financial information and potential implications of the takeover bid before deciding on the best course of action.
upvoted 0 times
...
Matthew
5 months ago
I think it might be the Housing Act of 1965, but I'm a bit unsure. I remember something about planning in that era.
upvoted 0 times
...
Kristeen
5 months ago
Okay, let me think this through step-by-step. Control charts are used to monitor process variability, so we need measures of central tendency and dispersion. X-bar and R seem like the obvious choice here.
upvoted 0 times
...
Gwen
5 months ago
This seems like a straightforward question about effective program organization. I'll focus on identifying the key features mentioned in the options.
upvoted 0 times
...
Shannon
9 months ago
Monitoring every keystroke? Might as well install a webcam in everyone's house while they're at it. Talk about taking cyber security to the extreme! *rolls eyes*
upvoted 0 times
...
Clorinda
9 months ago
Haha, monitoring every keystroke? That's some hardcore Big Brother stuff right there. I'd feel like I'm working for the NSA. Option C is the way to go.
upvoted 0 times
Dalene
8 months ago
Definitely, it's important to track potential security breaches.
upvoted 0 times
...
Harrison
8 months ago
I think monitoring failed access attempts is a good middle ground.
upvoted 0 times
...
Maira
8 months ago
Yeah, it does feel a bit invasive.
upvoted 0 times
...
Reuben
8 months ago
I agree, monitoring every keystroke seems a bit extreme.
upvoted 0 times
...
...
Rodolfo
10 months ago
I'm not so sure. Tracking out of hours access could also be really useful to spot suspicious activity. Why not just monitor everything and be safe? *laughs*
upvoted 0 times
Sena
8 months ago
C) ABC should monitor and record all failed access attempts.
upvoted 0 times
...
Beckie
8 months ago
B) ABC should monitor and record every out of hours access
upvoted 0 times
...
Colene
9 months ago
C) ABC should monitor and record all failed access attempts.
upvoted 0 times
...
Dallas
9 months ago
B) ABC should monitor and record every out of hours access
upvoted 0 times
...
Shawana
9 months ago
A) ABC should monitor and record every device type used for access
upvoted 0 times
...
Esteban
9 months ago
A) ABC should monitor and record every device type used for access
upvoted 0 times
...
...
Mari
10 months ago
I agree, option C is the best choice. Monitoring failed attempts can help identify potential threats and vulnerabilities without being overly invasive.
upvoted 0 times
Sharika
9 months ago
Monitoring failed access attempts is a good idea, it can help prevent potential security breaches.
upvoted 0 times
...
Doretha
9 months ago
I agree, monitoring failed access attempts is a good way to increase awareness of cyber security risks.
upvoted 0 times
...
Shakira
9 months ago
I think option C is the best choice. Monitoring failed access attempts can help identify potential threats.
upvoted 0 times
...
...
Lindsey
10 months ago
Monitoring failed access attempts is the most effective way to increase cyber security awareness. Tracking every keystroke seems like overkill and would be a major privacy concern.
upvoted 0 times
Shawna
8 months ago
D) ABC should monitor and record every keystroke of every user.
upvoted 0 times
...
Brinda
8 months ago
C) ABC should monitor and record all failed access attempts.
upvoted 0 times
...
Alline
8 months ago
B) ABC should monitor and record every out of hours access
upvoted 0 times
...
Delpha
9 months ago
A) ABC should monitor and record every device type used for access
upvoted 0 times
...
Hana
9 months ago
D) ABC should monitor and record every keystroke of every user.
upvoted 0 times
...
Annice
9 months ago
C) ABC should monitor and record all failed access attempts.
upvoted 0 times
...
Lucina
9 months ago
B) ABC should monitor and record every out of hours access
upvoted 0 times
...
Danilo
10 months ago
A) ABC should monitor and record every device type used for access
upvoted 0 times
...
...
Daren
10 months ago
But wouldn't monitoring and recording every keystroke of every user provide the most detailed information?
upvoted 0 times
...
Adelina
10 months ago
I agree with Kenda. It would help identify potential security threats.
upvoted 0 times
...
Kenda
11 months ago
I think monitoring and recording all failed access attempts would be most effective.
upvoted 0 times
...

Save Cancel