Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CIMAPRA19-P03-1 Exam - Topic 6 Question 27 Discussion

Actual exam question for CIMA's CIMAPRA19-P03-1 exam
Question #: 27
Topic #: 6
[All CIMAPRA19-P03-1 Questions]

ABC is an online retail chain which operates on a 24/7 basis It has been updating its Cyber Security processes and has implemented a centralised monitoring process to track activity through its web access portal

Which of the following activities will increase the awareness of its cyber security risk most effectively?

Show Suggested Answer Hide Answer
Suggested Answer: A, B, D

Contribute your Thoughts:

0/2000 characters
Santos
5 months ago
Wait, they want to track every keystroke? That's extreme!
upvoted 0 times
...
Maddie
5 months ago
Failed access attempts are definitely key to understanding threats!
upvoted 0 times
...
Shenika
5 months ago
Out of hours access could reveal a lot of risks.
upvoted 0 times
...
Truman
6 months ago
Not sure about tracking every keystroke, feels invasive.
upvoted 0 times
...
Whitney
6 months ago
Monitoring every device type is a smart move!
upvoted 0 times
...
Sharee
6 months ago
Monitoring every keystroke seems excessive and could raise privacy concerns. I wonder if that would actually increase awareness or just create more issues.
upvoted 0 times
...
Myra
6 months ago
I practiced a similar question where tracking device types was emphasized, but I feel like that might not directly raise awareness as much as monitoring failed attempts.
upvoted 0 times
...
Janey
6 months ago
I think monitoring out of hours access is important too, especially since it could indicate unauthorized activity. I just can't recall if it's the best choice here.
upvoted 0 times
...
Johnetta
6 months ago
I remember we discussed how monitoring failed access attempts could help identify potential threats, but I'm not sure if it's the most effective method overall.
upvoted 0 times
...
Vivienne
6 months ago
This seems like a tricky situation for Company C. I'd need to carefully analyze the financial information and potential implications of the takeover bid before deciding on the best course of action.
upvoted 0 times
...
Matthew
6 months ago
I think it might be the Housing Act of 1965, but I'm a bit unsure. I remember something about planning in that era.
upvoted 0 times
...
Kristeen
6 months ago
Okay, let me think this through step-by-step. Control charts are used to monitor process variability, so we need measures of central tendency and dispersion. X-bar and R seem like the obvious choice here.
upvoted 0 times
...
Gwen
7 months ago
This seems like a straightforward question about effective program organization. I'll focus on identifying the key features mentioned in the options.
upvoted 0 times
...
Shannon
11 months ago
Monitoring every keystroke? Might as well install a webcam in everyone's house while they're at it. Talk about taking cyber security to the extreme! *rolls eyes*
upvoted 0 times
...
Clorinda
11 months ago
Haha, monitoring every keystroke? That's some hardcore Big Brother stuff right there. I'd feel like I'm working for the NSA. Option C is the way to go.
upvoted 0 times
Dalene
9 months ago
Definitely, it's important to track potential security breaches.
upvoted 0 times
...
Harrison
9 months ago
I think monitoring failed access attempts is a good middle ground.
upvoted 0 times
...
Maira
10 months ago
Yeah, it does feel a bit invasive.
upvoted 0 times
...
Reuben
10 months ago
I agree, monitoring every keystroke seems a bit extreme.
upvoted 0 times
...
...
Rodolfo
11 months ago
I'm not so sure. Tracking out of hours access could also be really useful to spot suspicious activity. Why not just monitor everything and be safe? *laughs*
upvoted 0 times
Sena
10 months ago
C) ABC should monitor and record all failed access attempts.
upvoted 0 times
...
Beckie
10 months ago
B) ABC should monitor and record every out of hours access
upvoted 0 times
...
Colene
10 months ago
C) ABC should monitor and record all failed access attempts.
upvoted 0 times
...
Dallas
10 months ago
B) ABC should monitor and record every out of hours access
upvoted 0 times
...
Shawana
10 months ago
A) ABC should monitor and record every device type used for access
upvoted 0 times
...
Esteban
11 months ago
A) ABC should monitor and record every device type used for access
upvoted 0 times
...
...
Mari
11 months ago
I agree, option C is the best choice. Monitoring failed attempts can help identify potential threats and vulnerabilities without being overly invasive.
upvoted 0 times
Sharika
10 months ago
Monitoring failed access attempts is a good idea, it can help prevent potential security breaches.
upvoted 0 times
...
Doretha
11 months ago
I agree, monitoring failed access attempts is a good way to increase awareness of cyber security risks.
upvoted 0 times
...
Shakira
11 months ago
I think option C is the best choice. Monitoring failed access attempts can help identify potential threats.
upvoted 0 times
...
...
Lindsey
12 months ago
Monitoring failed access attempts is the most effective way to increase cyber security awareness. Tracking every keystroke seems like overkill and would be a major privacy concern.
upvoted 0 times
Shawna
10 months ago
D) ABC should monitor and record every keystroke of every user.
upvoted 0 times
...
Brinda
10 months ago
C) ABC should monitor and record all failed access attempts.
upvoted 0 times
...
Alline
10 months ago
B) ABC should monitor and record every out of hours access
upvoted 0 times
...
Delpha
10 months ago
A) ABC should monitor and record every device type used for access
upvoted 0 times
...
Hana
10 months ago
D) ABC should monitor and record every keystroke of every user.
upvoted 0 times
...
Annice
10 months ago
C) ABC should monitor and record all failed access attempts.
upvoted 0 times
...
Lucina
11 months ago
B) ABC should monitor and record every out of hours access
upvoted 0 times
...
Danilo
11 months ago
A) ABC should monitor and record every device type used for access
upvoted 0 times
...
...
Daren
12 months ago
But wouldn't monitoring and recording every keystroke of every user provide the most detailed information?
upvoted 0 times
...
Adelina
12 months ago
I agree with Kenda. It would help identify potential security threats.
upvoted 0 times
...
Kenda
1 year ago
I think monitoring and recording all failed access attempts would be most effective.
upvoted 0 times
...

Save Cancel