New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Cybersecurity-Audit-Certificate Exam - Topic 1 Question 27 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 27
Topic #: 1
[All Cybersecurity-Audit-Certificate Questions]

Which of the following is a known potential risk of using a software defined perimeter (SDP) controller?

Show Suggested Answer Hide Answer
Suggested Answer: A

One of the known potential risks of using a Software Defined Perimeter (SDP) controller is unauthorized access, which can jeopardize the confidentiality, integrity, or availability of data. SDP controllers work by creating a boundary around network resources, but if an unauthorized user gains access, perhaps through stolen credentials or exploitation of a vulnerability, they could potentially access sensitive data or disrupt services.


Contribute your Thoughts:

0/2000 characters
Martin
3 months ago
B is valid, but I believe most systems have recovery plans in place.
upvoted 0 times
...
Tyra
3 months ago
Wait, are we really saying an SDP can lead to unauthorized access? Sounds sketchy.
upvoted 0 times
...
Roosevelt
3 months ago
C is a real issue too, valid creds can be a huge vulnerability.
upvoted 0 times
...
Melissia
4 months ago
I think D is more concerning, firewalls are crucial!
upvoted 0 times
...
Wilda
4 months ago
A is definitely a risk, especially with remote access.
upvoted 0 times
...
Ira
4 months ago
I vaguely recall something about data recovery issues being a risk, which makes me lean towards B, but I’m not 100% sure.
upvoted 0 times
...
Leanna
4 months ago
I think we had a practice question about firewalls failing to block traffic, so D could be relevant here, but I’m not completely confident.
upvoted 0 times
...
Leota
4 months ago
I'm not entirely sure, but I feel like option C about valid credentials could be a risk too. It seems like something we covered in class.
upvoted 0 times
...
Kristel
5 months ago
I remember discussing how unauthorized access can really mess with data confidentiality, so I think A might be a strong contender.
upvoted 0 times
...
Lavonna
5 months ago
This seems like a pretty standard question on SDP controllers. I'm feeling good about my chances of getting this one right.
upvoted 0 times
...
Celestina
5 months ago
I'm a bit confused by the options here. I'll need to review my notes on SDP controllers to make sure I understand the potential risks before answering.
upvoted 0 times
...
Effie
5 months ago
Okay, let's see here. The key is to focus on the potential risks of using an SDP controller specifically. I think I've got a good strategy for approaching this.
upvoted 0 times
...
Martin
5 months ago
Hmm, I'm not entirely sure about this one. I'll need to think it through carefully to make sure I select the right answer.
upvoted 0 times
...
Laine
5 months ago
This question seems pretty straightforward. I'm pretty confident I can identify the known potential risk of using an SDP controller.
upvoted 0 times
...
Elfrieda
5 months ago
This question seems straightforward, but I want to make sure I understand the concept of fast tracking before answering.
upvoted 0 times
...
Domitila
1 year ago
Haha, I bet the person who wrote this question was really hoping we'd all fall for the 'ineffective firewall' option. Nice try, but I'm going with A!
upvoted 0 times
...
Sherell
1 year ago
Hmm, I'm not sure if D is the right answer. Isn't the whole point of an SDP to replace traditional firewalls? That one seems a bit off to me.
upvoted 0 times
Sheridan
1 year ago
C) Unauthorized use of valid credentials may compromise encrypted data at rest.
upvoted 0 times
...
Rolland
1 year ago
B) Operations may be adversely affected if data cannot be recovered and restored timely.
upvoted 0 times
...
Fallon
1 year ago
A) Unauthorized access may jeopardize data confidentiality, integrity, or availability.
upvoted 0 times
...
...
Audrie
1 year ago
I believe another risk could be unauthorized use of valid credentials compromising encrypted data at rest.
upvoted 0 times
...
Meghann
1 year ago
I agree with Jeannetta, unauthorized access can definitely compromise data integrity and availability.
upvoted 0 times
...
Jeannetta
1 year ago
I think the potential risk of using a software defined perimeter controller is unauthorized access jeopardizing data confidentiality.
upvoted 0 times
...
Adrianna
1 year ago
I think C is the most relevant here. If encrypted data at rest is compromised, that's a major security breach that needs to be addressed.
upvoted 0 times
Ashleigh
1 year ago
C) Unauthorized use of valid credentials may compromise encrypted data at rest.
upvoted 0 times
...
Keneth
1 year ago
B) Operations may be adversely affected if data cannot be recovered and restored timely.
upvoted 0 times
...
Ceola
1 year ago
A) Unauthorized access may jeopardize data confidentiality, integrity, or availability.
upvoted 0 times
...
...
Reiko
1 year ago
Option A seems the most concerning to me. Unauthorized access could really jeopardize sensitive data, and that's a huge risk with an SDP controller.
upvoted 0 times
Paulina
1 year ago
D) An ineffective firewall may fail to identify and block unwanted network traffic.
upvoted 0 times
...
Jarvis
1 year ago
C) Unauthorized use of valid credentials may compromise encrypted data at rest.
upvoted 0 times
...
Aleta
1 year ago
B) Operations may be adversely affected if data cannot be recovered and restored timely.
upvoted 0 times
...
Tomoko
1 year ago
A) Unauthorized access may jeopardize data confidentiality, integrity, or availability.
upvoted 0 times
...
...

Save Cancel