Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

IIBA-CCA Reviews Questions

Page: 4 / 6
Total 75 questions

Certificate in Cybersecurity Analysis (CCA) Questions and Answers

Question 13

Which of the following control methods is used to protect integrity?

Options:

A.

Principle of Least Privilege

B.

Biometric Verification

C.

Anti-Malicious Code Detection

D.

Backups and Redundancy

Question 14

NIST 800-30 defines cyber risk as a function of the likelihood of a given threat-source exercising a potential vulnerability, and:

Options:

A.

the pre-disposing conditions of the vulnerability.

B.

the probability of detecting damage to the infrastructure.

C.

the effectiveness of the control assurance framework.

D.

the resulting impact of that adverse event on the organization.

Question 15

The hash function supports data in transit by ensuring:

Options:

A.

validation that a message originated from a particular user.

B.

a message was modified in transit.

C.

a public key is transitioned into a private key.

D.

encrypted messages are not shared with another party.

Question 16

What stage of incident management would "strengthen the security from lessons learned" fall into?

Options:

A.

Response

B.

Recovery

C.

Detection

D.

Remediation

Page: 4 / 6
Total 75 questions