Spring Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

IIBA IIBA-CCA Certificate in Cybersecurity Analysis (CCA) Exam Practice Test

Page: 1 / 8
Total 75 questions

Certificate in Cybersecurity Analysis (CCA) Questions and Answers

Question 1

Which organizational area would drive a cybersecurity infrastructure Business Case?

Options:

A.

Risk

B.

IT

C.

Legal

D.

Finance

Question 2

In the OSI model for network communication, the Session Layer is responsible for:

Options:

A.

establishing a connection and terminating it when it is no longer needed.

B.

presenting data to the receiver in a form that it recognizes.

C.

adding appropriate network addresses to packets.

D.

transmitting the data on the medium.

Question 3

What terms are often used to describe the relationship between a sub-directory and the directory in which it is cataloged?

Options:

A.

Primary and Secondary

B.

Multi-factor Tokens

C.

Parent and Child

D.

Embedded Layers

Question 4

Separation of duties, as a security principle, is intended to:

Options:

A.

optimize security application performance.

B.

ensure that all security systems are integrated.

C.

balance user workload.

D.

prevent fraud and error.

Question 5

Which of the following challenges to embedded system security can be addressed through ongoing, remote maintenance?

Options:

A.

Processors being overwhelmed by the demands of security processing

B.

Deploying updated firmware as vulnerabilities are discovered and addressed

C.

Resource constraints due to limitations on battery, memory, and other physical components

D.

Physical security attacks that take advantage of vulnerabilities in the hardware

Question 6

How is a risk score calculated?

Options:

A.

Based on the confidentiality, integrity, and availability characteristics of the system

B.

Based on the combination of probability and impact

C.

Based on past experience regarding the risk

D.

Based on an assessment of threats by the cyber security team

Question 7

Which of the following should be addressed by functional security requirements?

Options:

A.

System reliability

B.

User privileges

C.

Identified vulnerabilities

D.

Performance and stability

Question 8

What is a Recovery Point Objective RPO?

Options:

A.

The point in time prior to the outage to which business and process data must be recovered

B.

The maximum time a system may be out of service before a significant business impact occurs

C.

The target time to restore a system without experiencing any significant business impact

D.

The target time to restore systems to operational status following an outage

Question 9

What is the definition of privileged account management?

Options:

A.

Establishing and maintaining access rights and controls for users who require elevated privileges to an entity for an administrative or support function

B.

Applying identity and access management controls

C.

Managing senior leadership and executive accounts

D.

Managing independent authentication of accounts

Question 10

A software product that supports threat detection, and compliance and security incident management, through the collection and analysis of security events and other data sources, is known as a:

Options:

A.

software as a service (SaaS).

B.

threat risk assessment (TRA).

C.

security information and event management system (SIEM).

D.

cloud access security broker (CASB).

Question 11

If a threat is expected to have a serious adverse effect, according to NIST SP 800-30 it would be rated with a severity level of:

Options:

A.

moderate.

B.

severe.

C.

severely low.

D.

very severe.

Question 12

Analyst B has discovered multiple attempts from unauthorized users to access confidential data. This is most likely?

Options:

A.

Admin

B.

Hacker

C.

User

D.

IT Support

Question 13

What is defined as an internal computerized table of access rules regarding the levels of computer access permitted to login IDs and computer terminals?

Options:

A.

Access Control List

B.

Access Control Entry

C.

Relational Access Database

D.

Directory Management System

Question 14

How does Transport Layer Security ensure the reliability of a connection?

Options:

A.

By ensuring a stateful connection between client and server

B.

By conducting a message integrity check to prevent loss or alteration of the message

C.

By ensuring communications use TCP/IP

D.

By using public and private keys to verify the identities of the parties to the data transfer

Question 15

What is an embedded system?

Options:

A.

A system that is located in a secure underground facility

B.

A system placed in a location and designed so it cannot be easily removed

C.

It provides computing services in a small form factor with limited processing power

D.

It safeguards the cryptographic infrastructure by storing keys inside a tamper-resistant external device

Question 16

Which of the following should be addressed in the organization's risk management strategy?

Options:

A.

Acceptable risk management methodologies

B.

Controls for each IT asset

C.

Processes for responding to a security breach

D.

Assignment of an executive responsible for risk management across the organization

Question 17

What is risk mitigation?

Options:

A.

Reducing the risk by implementing one or more countermeasures

B.

Purchasing insurance against a cybersecurity breach

C.

Eliminating the risk by stopping the activity which causes risk

D.

Documenting the risk in full and preparing a recovery plan

Question 18

What common mitigation tool is used for directly handling or treating cyber risks?

Options:

A.

Exit Strategy

B.

Standards

C.

Control

D.

Business Continuity Plan

Question 19

Which organizational resource category is known as "the first and last line of defense" from an attack?

Options:

A.

Firewalls

B.

Employees

C.

Endpoint Devices

D.

Classified Data

Question 20

What risk factors should the analyst consider when assessing the Overall Likelihood of a threat?

Options:

A.

Attack Initiation Likelihood and Initiated Attack Success Likelihood

B.

Risk Level, Risk Impact, and Mitigation Strategy

C.

Overall Site Traffic and Commerce Volume

D.

Past Experience and Trends

Question 21

Violations of the EU’s General Data Protection Regulations GDPR can result in:

Options:

A.

mandatory upgrades of the security infrastructure.

B.

fines of €20 million or 4% of annual turnover, whichever is less.

C.

fines of €20 million or 4% of annual turnover, whichever is greater.

D.

a complete audit of the enterprise’s security processes.

Question 22

What is whitelisting in the context of network security?

Options:

A.

Grouping assets together based on common security requirements, and placing each group into an isolated network zone

B.

Denying access to applications that have been determined to be malicious

C.

Explicitly allowing identified people, groups, or services access to a particular privilege, service, or recognition

D.

Running software to identify any malware present on a computer system

Page: 1 / 8
Total 75 questions