Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

IIBA-CCA Certificate in Cybersecurity Analysis (CCA) Questions and Answers

Questions 4

If a Business Analyst is asked to document the current state of the organization's web-based business environment, and recommend where cost savings could be realized, what risk factor must be included in the analysis?

Options:

A.

Organizational Risk Tolerance

B.

Impact Severity

C.

Application Vulnerabilities

D.

Threat Likelihood

Buy Now
Questions 5

Which of the following is a cybersecurity risk that should be addressed by business analysis during solution development?

Options:

A.

Project budgets may prevent developers from implementing the full set of security measures

B.

QA may fail to identify all possible security vulnerabilities during system testing

C.

The solution may not be understood well enough to reliably identify security risks

D.

Code may be implemented in ways that introduce new vulnerabilities

Buy Now
Questions 6

ITIL Information Technology Infrastructure Library defines:

Options:

A.

a standard of best practices for IT Service Management.

B.

how technology and hardware systems interface securely with one another.

C.

the standard set of components used in every business technology system.

D.

a set of security requirements that every business technology system must meet.

Buy Now
Questions 7

What privacy legislation governs the use of healthcare data in the United States?

Options:

A.

Privacy Act

B.

PIPEDA

C.

HIPAA

D.

PCI-DSS

Buy Now
Questions 8

SSL/TLS encryption capability is provided by:

Options:

A.

certificates.

B.

protocols.

C.

passwords.

D.

controls.

Buy Now
Questions 9

Which of the following control methods is used to protect integrity?

Options:

A.

Principle of Least Privilege

B.

Biometric Verification

C.

Anti-Malicious Code Detection

D.

Backups and Redundancy

Buy Now
Questions 10

A significant benefit of role-based access is that it:

Options:

A.

simplifies the assignment of correct access levels to a user based on the work they will perform.

B.

makes it easier to audit and verify data access.

C.

ensures that employee accounts will be shut down on departure or role change.

D.

ensures that tasks and associated privileges for a specific business process are disseminated among multiple users.

Buy Now
Questions 11

What common mitigation tool is used for directly handling or treating cyber risks?

Options:

A.

Exit Strategy

B.

Standards

C.

Control

D.

Business Continuity Plan

Buy Now
Questions 12

Controls that are put in place to address specific risks may include:

Options:

A.

only initial reviews.

B.

technology or process solutions.

C.

partial coverage of one or more risks.

D.

coverage for partial extent and scope of the risk.

Buy Now
Questions 13

The main phases of incident management are:

Options:

A.

awareness, interest, desire, action.

B.

reporting, investigation, assessment, corrective actions, review.

C.

initiation, planning, action, closing.

D.

assess, investigate, report, respond, legal compliance.

Buy Now
Questions 14

A software product that supports threat detection, and compliance and security incident management, through the collection and analysis of security events and other data sources, is known as a:

Options:

A.

software as a service (SaaS).

B.

threat risk assessment (TRA).

C.

security information and event management system (SIEM).

D.

cloud access security broker (CASB).

Buy Now
Questions 15

What stage of incident management would "strengthen the security from lessons learned" fall into?

Options:

A.

Response

B.

Recovery

C.

Detection

D.

Remediation

Buy Now
Questions 16

What operational practice would risk managers employ to demonstrate the effectiveness of security controls?

Options:

A.

Metrics Reporting

B.

Change Management

C.

Security Awareness Training

D.

Penetration Testing

Buy Now
Questions 17

Public & Private key pairs are an example of what technology?

Options:

A.

Virtual Private Network

B.

IoT

C.

Encryption

D.

Network Segregation

Buy Now
Questions 18

Protecting data at rest secures data that is:

Options:

A.

moving from device to device.

B.

moving from network to network.

C.

stored on any device or network.

D.

less vulnerable to attack.

Buy Now
Questions 19

How does Transport Layer Security ensure the reliability of a connection?

Options:

A.

By ensuring a stateful connection between client and server

B.

By conducting a message integrity check to prevent loss or alteration of the message

C.

By ensuring communications use TCP/IP

D.

By using public and private keys to verify the identities of the parties to the data transfer

Buy Now
Questions 20

Certificates that provide SSL/TLS encryption capability:

Options:

A.

are similar to the unencrypted data.

B.

can be purchased from certificate authorities.

C.

are for data located on thumb drives.

D.

can provide authorization of data access.

Buy Now
Questions 21

Information classification of data is a level of protection that is based on an organization's:

Options:

A.

retention for auditing purposes.

B.

need for access by employees.

C.

timing of availability for automated systems.

D.

risk to loss or harm from disclosure.

Buy Now
Questions 22

How is a risk score calculated?

Options:

A.

Based on the confidentiality, integrity, and availability characteristics of the system

B.

Based on the combination of probability and impact

C.

Based on past experience regarding the risk

D.

Based on an assessment of threats by the cyber security team

Buy Now
Exam Code: IIBA-CCA
Exam Name: Certificate in Cybersecurity Analysis (CCA)
Last Update: Feb 21, 2026
Questions: 75
IIBA-CCA pdf

IIBA-CCA PDF

$25.5  $84.99
IIBA-CCA Engine

IIBA-CCA Testing Engine

$30  $99.99
IIBA-CCA PDF + Engine

IIBA-CCA PDF + Testing Engine

$40.5  $134.99