Loading
Preparing the page...
Loading
Preparing the page...
See why professionals choose our situational, real-world assessments. Our questions test understanding and application, not just memorisation.
Based on real industry scenarios that test decision-making and application, not just knowledge recall.
Aligned with professional certification standards (BCS, CompTIA, TOGAF) and industry best practices.
Created by industry experts with decades of combined experience in cybersecurity, software architecture, and data systems.
Questions reflect situations professionals actually face, testing understanding of concepts in real-world contexts.
These are sample questions demonstrating our assessment style. Actual assessment questions are different and randomised from a comprehensive pool of 150 questions per level.
Actual assessments: Contain 50 randomised questions selected from a pool of 150 questions. Questions are different each time you take the assessment. Pass threshold: 80%. Two attempts included.
Scenario
You're the security engineer for a financial services company. A critical CVE (CVSS 9.8) is announced for a library your payment processing system uses. The vulnerability allows remote code execution. Your next release is scheduled in 3 days and includes new features customers are expecting.
What is the FIRST action you should take?
A. Immediately patch the library and redeploy to production
B. Assess the actual risk to your specific deployment (is it exposed? is it exploitable?)
C. Notify customers of a potential security issue
D. Schedule an emergency change board meeting for next week
Scenario
You're architecting a new microservices system for a healthcare data platform that must handle: - Patient data (GDPR/PII sensitive, high compliance requirements) - Real-time monitoring data (high volume, low latency - 100k events/second) - Analytics workloads (batch processing, high throughput) - Compliance reporting (audit trails, data lineage, retention) You're considering several architectural patterns: - Service mesh (Istio) for inter-service communication and security - Event-driven architecture (Kafka) for data flow - API Gateway for external access and rate limiting - Distributed tracing (OpenTelemetry) for observability
Given GDPR requirements and the need to prove data lineage for audits, what should you prioritise FIRST in your architecture, and why?
A. Implement service mesh first (establishes security and observability foundation)
B. Design event schema and data contracts first (data contracts enable audit trails and lineage)
C. Set up API Gateway first (defines external interface and access controls)
D. Implement distributed tracing first (need observability before you can secure what you can't see)
Scenario
Your organisation is preparing to participate in the European Health Data Space (EHDS). You need to implement a connector that enables: - Secure data sharing with healthcare providers across EU member states - Patient consent management (GDPR Article 7 compliant, granular consent) - Data sovereignty (data processing stays within EU, no third-country transfers) - Interoperability with existing hospital systems (legacy and modern) - Comprehensive audit logging for EHDS compliance audits
You've identified these implementation priorities. Rank these in order of implementation priority. Explain your reasoning for the top 3.
1. Implement IDS (International Data Spaces) connector (technical foundation)
2. Design consent management workflow and UI (regulatory requirement)
3. Map existing hospital data schemas to EHDS standards (interoperability)
4. Implement audit logging infrastructure (compliance)
5. Conduct security assessment and threat modeling (security and risk)
Practice tests: Use the same structure, difficulty, and format as assessments. Practice with confidence knowing you're preparing with questions that match the real assessment style.
See the quality. Experience the assessment. Start with a free practice test or purchase your assessment today.
Used by professionals worldwide • Aligned with certification standards • Created by industry experts