Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

IIBA IIBA-CCA Certificate in Cybersecurity Analysis (CCA) Exam Practice Test

Demo: 22 questions
Total 75 questions

Certificate in Cybersecurity Analysis (CCA) Questions and Answers

Question 1

If a Business Analyst is asked to document the current state of the organization's web-based business environment, and recommend where cost savings could be realized, what risk factor must be included in the analysis?

Options:

A.

Organizational Risk Tolerance

B.

Impact Severity

C.

Application Vulnerabilities

D.

Threat Likelihood

Question 2

What common mitigation tool is used for directly handling or treating cyber risks?

Options:

A.

Exit Strategy

B.

Standards

C.

Control

D.

Business Continuity Plan

Question 3

What is the first step of the forensic process?

Options:

A.

Reporting

B.

Examination

C.

Analysis

D.

Collection

Question 4

What stage of incident management would "strengthen the security from lessons learned" fall into?

Options:

A.

Response

B.

Recovery

C.

Detection

D.

Remediation

Question 5

Analyst B has discovered unauthorized access to data. What has she discovered?

Options:

A.

Breach

B.

Hacker

C.

Threat

D.

Ransomware

Question 6

Compliance with regulations is generally demonstrated through:

Options:

A.

independent audits of systems and security procedures.

B.

review of security requirements by senior executives and/or the Board.

C.

extensive QA testing prior to system implementation.

D.

penetration testing by ethical hackers.

Question 7

The process by which organizations assess the data they hold and the level of protection it should be given based on its risk to loss or harm from disclosure, is known as:

Options:

A.

vulnerability assessment.

B.

internal audit.

C.

information classification.

D.

information categorization.

Question 8

A significant benefit of role-based access is that it:

Options:

A.

simplifies the assignment of correct access levels to a user based on the work they will perform.

B.

makes it easier to audit and verify data access.

C.

ensures that employee accounts will be shut down on departure or role change.

D.

ensures that tasks and associated privileges for a specific business process are disseminated among multiple users.

Question 9

What terms are often used to describe the relationship between a sub-directory and the directory in which it is cataloged?

Options:

A.

Primary and Secondary

B.

Multi-factor Tokens

C.

Parent and Child

D.

Embedded Layers

Question 10

Where business process diagrams can be used to identify vulnerabilities within solution processes, what tool can be used to identify vulnerabilities within solution technology?

Options:

A.

Vulnerability-as-a-Service

B.

Penetration Test

C.

Security Patch

D.

Smoke Test

Question 11

If a threat is expected to have a serious adverse effect, according to NIST SP 800-30 it would be rated with a severity level of:

Options:

A.

moderate.

B.

severe.

C.

severely low.

D.

very severe.

Question 12

What is an embedded system?

Options:

A.

A system that is located in a secure underground facility

B.

A system placed in a location and designed so it cannot be easily removed

C.

It provides computing services in a small form factor with limited processing power

D.

It safeguards the cryptographic infrastructure by storing keys inside a tamper-resistant external device

Question 13

How should categorization information be used in business impact analysis?

Options:

A.

To identify discrepancies between the security categorization and the expected business impact

B.

To assess whether information should be shared with other systems

C.

To determine the time and effort required for business impact assessment

D.

To ensure that systems are designed to support the appropriate security categorization

Question 14

Which statement is true about a data warehouse?

Options:

A.

Data stored in a data warehouse is used for analytical purposes, not operational tasks

B.

The data warehouse must use the same data structures as production systems

C.

Data warehouses should act as a central repository for the data generated by all operational systems

D.

Data cleaning must be done on operational systems before the data is transferred to a data warehouse

Question 15

What business analysis deliverable would be an essential input when designing an audit log report?

Options:

A.

Access Control Requirements

B.

Risk Log

C.

Future State Business Process

D.

Internal Audit Report

Question 16

Recovery Point Objectives and Recovery Time Objectives are based on what system attribute?

Options:

A.

Sensitivity

B.

Vulnerability

C.

Cost

D.

Criticality

Question 17

There are three states in which data can exist:

Options:

A.

at dead, in action, in use.

B.

at dormant, in mobile, in use.

C.

at sleep, in awake, in use.

D.

at rest, in transit, in use.

Question 18

What does non-repudiation mean in the context of web security?

Options:

A.

Ensuring that all traffic between web servers must be securely encrypted

B.

Providing permission to use web server resources according to security policies and specified procedures, so that the activity can be audited

C.

Ensuring that all data has not been altered in an unauthorized manner while being transmitted between web servers

D.

Providing the sender of a message with proof of delivery, and the receiver with proof of the sender's identity

Question 19

What risk factors should the analyst consider when assessing the Overall Likelihood of a threat?

Options:

A.

Attack Initiation Likelihood and Initiated Attack Success Likelihood

B.

Risk Level, Risk Impact, and Mitigation Strategy

C.

Overall Site Traffic and Commerce Volume

D.

Past Experience and Trends

Question 20

Violations of the EU’s General Data Protection Regulations GDPR can result in:

Options:

A.

mandatory upgrades of the security infrastructure.

B.

fines of €20 million or 4% of annual turnover, whichever is less.

C.

fines of €20 million or 4% of annual turnover, whichever is greater.

D.

a complete audit of the enterprise’s security processes.

Question 21

Other than the Requirements Analysis document, in what project deliverable should Vendor Security Requirements be included?

Options:

A.

Training Plan

B.

Business Continuity Plan

C.

Project Charter

D.

Request For Proposals

Question 22

Which organizational resource category is known as "the first and last line of defense" from an attack?

Options:

A.

Firewalls

B.

Employees

C.

Endpoint Devices

D.

Classified Data

Demo: 22 questions
Total 75 questions