Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

IIBA IIBA-CCA - Certificate in Cybersecurity Analysis (CCA)

Page: 2 / 3
Total 75 questions

What is the "impact" in the context of cybersecurity risk?

A.

The potential for violation of privacy laws and regulations from a cybersecurity breach

B.

The financial costs to the organization resulting from a breach

C.

The probability that a breach will occur within a given period of time

D.

The magnitude of harm that can be expected from unauthorized information use

What is whitelisting in the context of network security?

A.

Grouping assets together based on common security requirements, and placing each group into an isolated network zone

B.

Denying access to applications that have been determined to be malicious

C.

Explicitly allowing identified people, groups, or services access to a particular privilege, service, or recognition

D.

Running software to identify any malware present on a computer system

What is an external audit?

A.

A review of security-related measures in place intended to identify possible vulnerabilities

B.

A process that the cybersecurity follows to ensure that they have implemented the proper controls

C.

A review of security expenditures by an independent party

D.

A review of security-related activities by an independent party to ensure compliance

Cybersecurity regulations typically require that enterprises demonstrate that they can protect:

A.

applications and technology systems.

B.

trade secrets and other intellectual property.

C.

personal data of customers and employees.

D.

business continuity and disaster recovery.

What terms are often used to describe the relationship between a sub-directory and the directory in which it is cataloged?

A.

Primary and Secondary

B.

Multi-factor Tokens

C.

Parent and Child

D.

Embedded Layers

Separation of duties, as a security principle, is intended to:

A.

optimize security application performance.

B.

ensure that all security systems are integrated.

C.

balance user workload.

D.

prevent fraud and error.

Which of the following factors is most important in determining the classification of personal information?

A.

Integrity

B.

Confidentiality

C.

Availability

D.

Accessibility

What privacy legislation governs the use of healthcare data in the United States?

A.

Privacy Act

B.

PIPEDA

C.

HIPAA

D.

PCI-DSS

Where SaaS is the delivery of a software service, what service does PaaS provide?

A.

Load Balancers

B.

Storage

C.

Subscriptions

D.

Operating System

What is the definition of privileged account management?

A.

Establishing and maintaining access rights and controls for users who require elevated privileges to an entity for an administrative or support function

B.

Applying identity and access management controls

C.

Managing senior leadership and executive accounts

D.

Managing independent authentication of accounts