Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the IIBA Cybersecurity Analysis IIBA-CCA Questions and answers with Dumpstech

Exam IIBA-CCA Premium Access

View all detail and faqs for the IIBA-CCA exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

How should categorization information be used in business impact analysis?

Options:

A.

To identify discrepancies between the security categorization and the expected business impact

B.

To assess whether information should be shared with other systems

C.

To determine the time and effort required for business impact assessment

D.

To ensure that systems are designed to support the appropriate security categorization

Questions # 12:

What risk to information integrity is a Business Analyst aiming to minimize, by defining processes and procedures that describe interrelations between data sets in a data warehouse implementation?

Options:

A.

Unauthorized Access

B.

Confidentiality

C.

Data Aggregation

D.

Cross-Site Scripting

Questions # 13:

Which of the following would qualify as a multi-factor authentication pair?

Options:

A.

Thumbprint and Encryption

B.

Something You Know and Something You Are

C.

Password and Token

D.

Encryption and Password

Questions # 14:

Which of the following should be addressed in the organization's risk management strategy?

Options:

A.

Acceptable risk management methodologies

B.

Controls for each IT asset

C.

Processes for responding to a security breach

D.

Assignment of an executive responsible for risk management across the organization

Questions # 15:

Cybersecurity regulations typically require that enterprises demonstrate that they can protect:

Options:

A.

applications and technology systems.

B.

trade secrets and other intellectual property.

C.

personal data of customers and employees.

D.

business continuity and disaster recovery.

Questions # 16:

What is a risk owner?

Options:

A.

The person accountable for resolving a risk

B.

The person who is responsible for creating the risk

C.

The person who will take the action to mitigate a risk

D.

The person who identified the risk

Questions # 17:

Analyst B has discovered multiple sources which can harm the organization’s systems. What has she discovered?

Options:

A.

Breach

B.

Hacker

C.

Threat

D.

Ransomware

Questions # 18:

What is an external audit?

Options:

A.

A review of security-related measures in place intended to identify possible vulnerabilities

B.

A process that the cybersecurity follows to ensure that they have implemented the proper controls

C.

A review of security expenditures by an independent party

D.

A review of security-related activities by an independent party to ensure compliance

Questions # 19:

Which organizational area would drive a cybersecurity infrastructure Business Case?

Options:

A.

Risk

B.

IT

C.

Legal

D.

Finance

Questions # 20:

What should organizations do with Key Risk Indicator KRI and Key Performance Indicator KPI data to facilitate decision making, and improve performance and accountability?

Options:

A.

Achieve, reset, and evaluate

B.

Collect, analyze, and report

C.

Prioritize, falsify, and report

D.

Challenge, compare, and revise

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions