Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium IIBA IIBA-CCA Dumps Questions Answers

Page: 1 / 6
Total 75 questions

Certificate in Cybersecurity Analysis (CCA) Questions and Answers

Question 1

What business analysis deliverable would be an essential input when designing an audit log report?

Options:

A.

Access Control Requirements

B.

Risk Log

C.

Future State Business Process

D.

Internal Audit Report

Buy Now
Question 2

Why would a Business Analyst include current technology when documenting the current state business processes surrounding a solution being replaced?

Options:

A.

To ensure the future state business processes are included in user training

B.

To identify potential security impacts to integrated systems within the value chain

C.

To identify and meet internal security governance requirements

D.

To classify the data elements so that information confidentiality, integrity, and availability are protected

Question 3

Recovery Point Objectives and Recovery Time Objectives are based on what system attribute?

Options:

A.

Sensitivity

B.

Vulnerability

C.

Cost

D.

Criticality

Question 4

If a threat is expected to have a serious adverse effect, according to NIST SP 800-30 it would be rated with a severity level of:

Options:

A.

moderate.

B.

severe.

C.

severely low.

D.

very severe.

Question 5

Which of the following is a cybersecurity risk that should be addressed by business analysis during solution development?

Options:

A.

Project budgets may prevent developers from implementing the full set of security measures

B.

QA may fail to identify all possible security vulnerabilities during system testing

C.

The solution may not be understood well enough to reliably identify security risks

D.

Code may be implemented in ways that introduce new vulnerabilities

Question 6

If a system contains data with differing security categories, how should this be addressed in the categorization process?

Options:

A.

Security for the system should be in line with the highest impact value across all categories

B.

The data should be segregated across multiple systems so that they can have the appropriate security level for each

C.

The data types should be merged into a single category and reevaluated

D.

Security for the system should be in line with the lowest impact value across all categories

Question 7

What is defined as an internal computerized table of access rules regarding the levels of computer access permitted to login IDs and computer terminals?

Options:

A.

Access Control List

B.

Access Control Entry

C.

Relational Access Database

D.

Directory Management System

Question 8

Public & Private key pairs are an example of what technology?

Options:

A.

Virtual Private Network

B.

IoT

C.

Encryption

D.

Network Segregation

Question 9

What common mitigation tool is used for directly handling or treating cyber risks?

Options:

A.

Exit Strategy

B.

Standards

C.

Control

D.

Business Continuity Plan

Question 10

Analyst B has discovered unauthorized access to data. What has she discovered?

Options:

A.

Breach

B.

Hacker

C.

Threat

D.

Ransomware

Question 11

Analyst B has discovered multiple sources which can harm the organization’s systems. What has she discovered?

Options:

A.

Breach

B.

Hacker

C.

Threat

D.

Ransomware

Question 12

Which of the following should be addressed by functional security requirements?

Options:

A.

System reliability

B.

User privileges

C.

Identified vulnerabilities

D.

Performance and stability

Question 13

Which of the following control methods is used to protect integrity?

Options:

A.

Principle of Least Privilege

B.

Biometric Verification

C.

Anti-Malicious Code Detection

D.

Backups and Redundancy

Question 14

NIST 800-30 defines cyber risk as a function of the likelihood of a given threat-source exercising a potential vulnerability, and:

Options:

A.

the pre-disposing conditions of the vulnerability.

B.

the probability of detecting damage to the infrastructure.

C.

the effectiveness of the control assurance framework.

D.

the resulting impact of that adverse event on the organization.

Question 15

The hash function supports data in transit by ensuring:

Options:

A.

validation that a message originated from a particular user.

B.

a message was modified in transit.

C.

a public key is transitioned into a private key.

D.

encrypted messages are not shared with another party.

Question 16

What stage of incident management would "strengthen the security from lessons learned" fall into?

Options:

A.

Response

B.

Recovery

C.

Detection

D.

Remediation

Question 17

Where SaaS is the delivery of a software service, what service does PaaS provide?

Options:

A.

Load Balancers

B.

Storage

C.

Subscriptions

D.

Operating System

Question 18

What terms are often used to describe the relationship between a sub-directory and the directory in which it is cataloged?

Options:

A.

Primary and Secondary

B.

Multi-factor Tokens

C.

Parent and Child

D.

Embedded Layers

Question 19

How does Transport Layer Security ensure the reliability of a connection?

Options:

A.

By ensuring a stateful connection between client and server

B.

By conducting a message integrity check to prevent loss or alteration of the message

C.

By ensuring communications use TCP/IP

D.

By using public and private keys to verify the identities of the parties to the data transfer

Question 20

If a Business Analyst is asked to document the current state of the organization's web-based business environment, and recommend where cost savings could be realized, what risk factor must be included in the analysis?

Options:

A.

Organizational Risk Tolerance

B.

Impact Severity

C.

Application Vulnerabilities

D.

Threat Likelihood

Question 21

What is an external audit?

Options:

A.

A review of security-related measures in place intended to identify possible vulnerabilities

B.

A process that the cybersecurity follows to ensure that they have implemented the proper controls

C.

A review of security expenditures by an independent party

D.

A review of security-related activities by an independent party to ensure compliance

Question 22

Which scenario is an example of the principle of least privilege being followed?

Options:

A.

An application administrator has full permissions to only the applications they support

B.

All application and database administrators have full permissions to every application in the company

C.

Certain users are granted administrative access to their network account, in case they need to install a web-app

D.

A manager who is conducting performance appraisals is granted access to HR files for all employees

Page: 1 / 6
Total 75 questions