Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

IIBA IIBA-CCA Dumps

Page: 1 / 8
Total 75 questions

Certificate in Cybersecurity Analysis (CCA) Questions and Answers

Question 1

Which capability would a solution option need to demonstrate in order to satisfy Logging Requirements?

Options:

A.

Facilitates Single Sign-On

B.

Records information about user access and actions in the system

C.

Integrates with Risk Logging software

D.

Offers both on-premise and as-a-service delivery options

Question 2

What risk factors should the analyst consider when assessing the Overall Likelihood of a threat?

Options:

A.

Attack Initiation Likelihood and Initiated Attack Success Likelihood

B.

Risk Level, Risk Impact, and Mitigation Strategy

C.

Overall Site Traffic and Commerce Volume

D.

Past Experience and Trends

Question 3

What is defined as an internal computerized table of access rules regarding the levels of computer access permitted to login IDs and computer terminals?

Options:

A.

Access Control List

B.

Access Control Entry

C.

Relational Access Database

D.

Directory Management System

Question 4

The main phases of incident management are:

Options:

A.

awareness, interest, desire, action.

B.

reporting, investigation, assessment, corrective actions, review.

C.

initiation, planning, action, closing.

D.

assess, investigate, report, respond, legal compliance.

Question 5

What privacy legislation governs the use of healthcare data in the United States?

Options:

A.

Privacy Act

B.

PIPEDA

C.

HIPAA

D.

PCI-DSS

Question 6

The opportunity cost of increased cybersecurity is that:

Options:

A.

cybersecurity adds considerably to the cost of developing new business systems.

B.

costs of meeting regulations are constantly increasing.

C.

the potential cost of implementing security will always be less than the potential risk from a breach of customer data.

D.

identifying and securing assets and systems requires resources that are therefore not available to other initiatives.

Question 7

Controls that are put in place to address specific risks may include:

Options:

A.

only initial reviews.

B.

technology or process solutions.

C.

partial coverage of one or more risks.

D.

coverage for partial extent and scope of the risk.

Question 8

Which of the following should be addressed in the organization's risk management strategy?

Options:

A.

Acceptable risk management methodologies

B.

Controls for each IT asset

C.

Processes for responding to a security breach

D.

Assignment of an executive responsible for risk management across the organization

Question 9

An internet-based organization whose address is not known has attempted to acquire personal identification details such as usernames and passwords by creating a fake website. This is an example of?

Options:

A.

Breach

B.

Phishing

C.

Threat

D.

Ransomware

Question 10

SSL/TLS encryption capability is provided by:

Options:

A.

certificates.

B.

protocols.

C.

passwords.

D.

controls.

Question 11

Which scenario is an example of the principle of least privilege being followed?

Options:

A.

An application administrator has full permissions to only the applications they support

B.

All application and database administrators have full permissions to every application in the company

C.

Certain users are granted administrative access to their network account, in case they need to install a web-app

D.

A manager who is conducting performance appraisals is granted access to HR files for all employees

Question 12

What is risk mitigation?

Options:

A.

Reducing the risk by implementing one or more countermeasures

B.

Purchasing insurance against a cybersecurity breach

C.

Eliminating the risk by stopping the activity which causes risk

D.

Documenting the risk in full and preparing a recovery plan

Question 13

Which of the following factors is most important in determining the classification of personal information?

Options:

A.

Integrity

B.

Confidentiality

C.

Availability

D.

Accessibility

Question 14

Analyst B has discovered multiple attempts from unauthorized users to access confidential data. This is most likely?

Options:

A.

Admin

B.

Hacker

C.

User

D.

IT Support

Question 15

In the OSI model for network communication, the Session Layer is responsible for:

Options:

A.

establishing a connection and terminating it when it is no longer needed.

B.

presenting data to the receiver in a form that it recognizes.

C.

adding appropriate network addresses to packets.

D.

transmitting the data on the medium.

Question 16

Which organizational resource category is known as "the first and last line of defense" from an attack?

Options:

A.

Firewalls

B.

Employees

C.

Endpoint Devices

D.

Classified Data

Question 17

What stage of incident management would "strengthen the security from lessons learned" fall into?

Options:

A.

Response

B.

Recovery

C.

Detection

D.

Remediation

Question 18

What term is defined as a fix to software programming errors and vulnerabilities?

Options:

A.

Control

B.

Release

C.

Log

D.

Patch

Question 19

Why would a Business Analyst include current technology when documenting the current state business processes surrounding a solution being replaced?

Options:

A.

To ensure the future state business processes are included in user training

B.

To identify potential security impacts to integrated systems within the value chain

C.

To identify and meet internal security governance requirements

D.

To classify the data elements so that information confidentiality, integrity, and availability are protected

Question 20

If a Business Analyst is asked to document the current state of the organization's web-based business environment, and recommend where cost savings could be realized, what risk factor must be included in the analysis?

Options:

A.

Organizational Risk Tolerance

B.

Impact Severity

C.

Application Vulnerabilities

D.

Threat Likelihood

Question 21

Certificates that provide SSL/TLS encryption capability:

Options:

A.

are similar to the unencrypted data.

B.

can be purchased from certificate authorities.

C.

are for data located on thumb drives.

D.

can provide authorization of data access.

Question 22

A significant benefit of role-based access is that it:

Options:

A.

simplifies the assignment of correct access levels to a user based on the work they will perform.

B.

makes it easier to audit and verify data access.

C.

ensures that employee accounts will be shut down on departure or role change.

D.

ensures that tasks and associated privileges for a specific business process are disseminated among multiple users.

Page: 1 / 8
Total 75 questions