Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Online IIBA-CCA Questions Video

Page: 2 / 6
Total 75 questions

Certificate in Cybersecurity Analysis (CCA) Questions and Answers

Question 5

Which of the following is a cybersecurity risk that should be addressed by business analysis during solution development?

Options:

A.

Project budgets may prevent developers from implementing the full set of security measures

B.

QA may fail to identify all possible security vulnerabilities during system testing

C.

The solution may not be understood well enough to reliably identify security risks

D.

Code may be implemented in ways that introduce new vulnerabilities

Question 6

If a system contains data with differing security categories, how should this be addressed in the categorization process?

Options:

A.

Security for the system should be in line with the highest impact value across all categories

B.

The data should be segregated across multiple systems so that they can have the appropriate security level for each

C.

The data types should be merged into a single category and reevaluated

D.

Security for the system should be in line with the lowest impact value across all categories

Question 7

What is defined as an internal computerized table of access rules regarding the levels of computer access permitted to login IDs and computer terminals?

Options:

A.

Access Control List

B.

Access Control Entry

C.

Relational Access Database

D.

Directory Management System

Question 8

Public & Private key pairs are an example of what technology?

Options:

A.

Virtual Private Network

B.

IoT

C.

Encryption

D.

Network Segregation

Page: 2 / 6
Total 75 questions