Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

IIBA IIBA-CCA - Certificate in Cybersecurity Analysis (CCA)

Page: 1 / 3
Total 75 questions

What common mitigation tool is used for directly handling or treating cyber risks?

A.

Exit Strategy

B.

Standards

C.

Control

D.

Business Continuity Plan

The process by which organizations assess the data they hold and the level of protection it should be given based on its risk to loss or harm from disclosure, is known as:

A.

vulnerability assessment.

B.

internal audit.

C.

information classification.

D.

information categorization.

Which organizational area would drive a cybersecurity infrastructure Business Case?

A.

Risk

B.

IT

C.

Legal

D.

Finance

Organizations who don't quantify this will likely miss opportunities toward achieving strategic goals and objectives:

A.

cybersecurity budget.

B.

control effectiveness.

C.

risk estimation.

D.

risk appetite.

The hash function supports data in transit by ensuring:

A.

validation that a message originated from a particular user.

B.

a message was modified in transit.

C.

a public key is transitioned into a private key.

D.

encrypted messages are not shared with another party.

Analyst B has discovered multiple attempts from unauthorized users to access confidential data. This is most likely?

A.

Admin

B.

Hacker

C.

User

D.

IT Support

Which organizational resource category is known as "the first and last line of defense" from an attack?

A.

Firewalls

B.

Employees

C.

Endpoint Devices

D.

Classified Data

What business analysis deliverable would be an essential input when designing an audit log report?

A.

Access Control Requirements

B.

Risk Log

C.

Future State Business Process

D.

Internal Audit Report

Which of the following should be addressed by functional security requirements?

A.

System reliability

B.

User privileges

C.

Identified vulnerabilities

D.

Performance and stability

Protecting data at rest secures data that is:

A.

moving from device to device.

B.

moving from network to network.

C.

stored on any device or network.

D.

less vulnerable to attack.