Spring Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the IIBA Cybersecurity Analysis IIBA-CCA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam IIBA-CCA Premium Access

View all detail and faqs for the IIBA-CCA exam


477 Students Passed

87% Average Score

91% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is the definition of privileged account management?

Options:

A.

Establishing and maintaining access rights and controls for users who require elevated privileges to an entity for an administrative or support function

B.

Applying identity and access management controls

C.

Managing senior leadership and executive accounts

D.

Managing independent authentication of accounts

Questions # 2:

The process by which organizations assess the data they hold and the level of protection it should be given based on its risk to loss or harm from disclosure, is known as:

Options:

A.

vulnerability assessment.

B.

internal audit.

C.

information classification.

D.

information categorization.

Questions # 3:

In the OSI model for network communication, the Session Layer is responsible for:

Options:

A.

establishing a connection and terminating it when it is no longer needed.

B.

presenting data to the receiver in a form that it recognizes.

C.

adding appropriate network addresses to packets.

D.

transmitting the data on the medium.

Questions # 4:

What risk to information integrity is a Business Analyst aiming to minimize, by defining processes and procedures that describe interrelations between data sets in a data warehouse implementation?

Options:

A.

Unauthorized Access

B.

Confidentiality

C.

Data Aggregation

D.

Cross-Site Scripting

Questions # 5:

Which of the following activities are part of the business analyst’s role in ensuring compliance with security policies?

Options:

A.

Auditing enterprise security policies to ensure that they comply with regulations

B.

Ensuring that security policies are reflected in the solution requirements

C.

Testing applications to identify potential security holes

D.

Checking to ensure that business users follow the security requirements

Questions # 6:

Which of the following is a cybersecurity risk that should be addressed by business analysis during solution development?

Options:

A.

Project budgets may prevent developers from implementing the full set of security measures

B.

QA may fail to identify all possible security vulnerabilities during system testing

C.

The solution may not be understood well enough to reliably identify security risks

D.

Code may be implemented in ways that introduce new vulnerabilities

Questions # 7:

Why is directory management important for cybersecurity?

Options:

A.

It prevents outside agents from viewing confidential company information

B.

It allows all application security to be managed through a single interface

C.

It prevents outsiders from knowing personal information about employees

D.

It controls access to folders and files on the network

Questions # 8:

An internet-based organization whose address is not known has attempted to acquire personal identification details such as usernames and passwords by creating a fake website. This is an example of?

Options:

A.

Breach

B.

Phishing

C.

Threat

D.

Ransomware

Questions # 9:

What is the purpose of Digital Rights Management DRM?

Options:

A.

To ensure that all attempts to access information are tracked, logged, and auditable

B.

To control the use, modification, and distribution of copyrighted works

C.

To ensure that corporate files and data cannot be accessed by unauthorized personnel

D.

To ensure that intellectual property remains under the full control of the originating enterprise

Questions # 10:

Which organizational area would drive a cybersecurity infrastructure Business Case?

Options:

A.

Risk

B.

IT

C.

Legal

D.

Finance

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.