Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > IIBA > Cybersecurity Analysis > IIBA-CCA

IIBA-CCA Certificate in Cybersecurity Analysis (CCA) Question and Answers

Question # 4

Certificates that provide SSL/TLS encryption capability:

A.

are similar to the unencrypted data.

B.

can be purchased from certificate authorities.

C.

are for data located on thumb drives.

D.

can provide authorization of data access.

Full Access
Question # 5

Which of the following should be addressed by functional security requirements?

A.

System reliability

B.

User privileges

C.

Identified vulnerabilities

D.

Performance and stability

Full Access
Question # 6

How is a risk score calculated?

A.

Based on the confidentiality, integrity, and availability characteristics of the system

B.

Based on the combination of probability and impact

C.

Based on past experience regarding the risk

D.

Based on an assessment of threats by the cyber security team

Full Access
Question # 7

ITIL Information Technology Infrastructure Library defines:

A.

a standard of best practices for IT Service Management.

B.

how technology and hardware systems interface securely with one another.

C.

the standard set of components used in every business technology system.

D.

a set of security requirements that every business technology system must meet.

Full Access
Question # 8

What common mitigation tool is used for directly handling or treating cyber risks?

A.

Exit Strategy

B.

Standards

C.

Control

D.

Business Continuity Plan

Full Access
Question # 9

Separation of duties, as a security principle, is intended to:

A.

optimize security application performance.

B.

ensure that all security systems are integrated.

C.

balance user workload.

D.

prevent fraud and error.

Full Access
Question # 10

Information classification of data is a level of protection that is based on an organization's:

A.

retention for auditing purposes.

B.

need for access by employees.

C.

timing of availability for automated systems.

D.

risk to loss or harm from disclosure.

Full Access
Question # 11

Why would a Business Analyst include current technology when documenting the current state business processes surrounding a solution being replaced?

A.

To ensure the future state business processes are included in user training

B.

To identify potential security impacts to integrated systems within the value chain

C.

To identify and meet internal security governance requirements

D.

To classify the data elements so that information confidentiality, integrity, and availability are protected

Full Access
Question # 12

What business analysis deliverable would be an essential input when designing an audit log report?

A.

Access Control Requirements

B.

Risk Log

C.

Future State Business Process

D.

Internal Audit Report

Full Access
Question # 13

Controls that are put in place to address specific risks may include:

A.

only initial reviews.

B.

technology or process solutions.

C.

partial coverage of one or more risks.

D.

coverage for partial extent and scope of the risk.

Full Access
Question # 14

Which of the following should be addressed in the organization's risk management strategy?

A.

Acceptable risk management methodologies

B.

Controls for each IT asset

C.

Processes for responding to a security breach

D.

Assignment of an executive responsible for risk management across the organization

Full Access
Question # 15

A significant benefit of role-based access is that it:

A.

simplifies the assignment of correct access levels to a user based on the work they will perform.

B.

makes it easier to audit and verify data access.

C.

ensures that employee accounts will be shut down on departure or role change.

D.

ensures that tasks and associated privileges for a specific business process are disseminated among multiple users.

Full Access
Question # 16

Which of the following control methods is used to protect integrity?

A.

Principle of Least Privilege

B.

Biometric Verification

C.

Anti-Malicious Code Detection

D.

Backups and Redundancy

Full Access
Question # 17

Which organizational resource category is known as "the first and last line of defense" from an attack?

A.

Firewalls

B.

Employees

C.

Endpoint Devices

D.

Classified Data

Full Access
Question # 18

What privacy legislation governs the use of healthcare data in the United States?

A.

Privacy Act

B.

PIPEDA

C.

HIPAA

D.

PCI-DSS

Full Access
Question # 19

What is the "impact" in the context of cybersecurity risk?

A.

The potential for violation of privacy laws and regulations from a cybersecurity breach

B.

The financial costs to the organization resulting from a breach

C.

The probability that a breach will occur within a given period of time

D.

The magnitude of harm that can be expected from unauthorized information use

Full Access
Question # 20

What is a Recovery Point Objective RPO?

A.

The point in time prior to the outage to which business and process data must be recovered

B.

The maximum time a system may be out of service before a significant business impact occurs

C.

The target time to restore a system without experiencing any significant business impact

D.

The target time to restore systems to operational status following an outage

Full Access
Question # 21

Analyst B has discovered multiple attempts from unauthorized users to access confidential data. This is most likely?

A.

Admin

B.

Hacker

C.

User

D.

IT Support

Full Access
Question # 22

The hash function supports data in transit by ensuring:

A.

validation that a message originated from a particular user.

B.

a message was modified in transit.

C.

a public key is transitioned into a private key.

D.

encrypted messages are not shared with another party.

Full Access