Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the IIBA Cybersecurity Analysis IIBA-CCA Questions and answers with Dumpstech

Exam IIBA-CCA Premium Access

View all detail and faqs for the IIBA-CCA exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which scenario is an example of the principle of least privilege being followed?

Options:

A.

An application administrator has full permissions to only the applications they support

B.

All application and database administrators have full permissions to every application in the company

C.

Certain users are granted administrative access to their network account, in case they need to install a web-app

D.

A manager who is conducting performance appraisals is granted access to HR files for all employees

Questions # 2:

When attackers exploit human emotions and connection to gain access, what technique are they using?

Options:

A.

Social Engineering

B.

Phishing

C.

Tailgating

D.

Malware

Questions # 3:

How does Transport Layer Security ensure the reliability of a connection?

Options:

A.

By ensuring a stateful connection between client and server

B.

By conducting a message integrity check to prevent loss or alteration of the message

C.

By ensuring communications use TCP/IP

D.

By using public and private keys to verify the identities of the parties to the data transfer

Questions # 4:

Recovery Point Objectives and Recovery Time Objectives are based on what system attribute?

Options:

A.

Sensitivity

B.

Vulnerability

C.

Cost

D.

Criticality

Questions # 5:

How is a risk score calculated?

Options:

A.

Based on the confidentiality, integrity, and availability characteristics of the system

B.

Based on the combination of probability and impact

C.

Based on past experience regarding the risk

D.

Based on an assessment of threats by the cyber security team

Questions # 6:

Public & Private key pairs are an example of what technology?

Options:

A.

Virtual Private Network

B.

IoT

C.

Encryption

D.

Network Segregation

Questions # 7:

NIST 800-30 defines cyber risk as a function of the likelihood of a given threat-source exercising a potential vulnerability, and:

Options:

A.

the pre-disposing conditions of the vulnerability.

B.

the probability of detecting damage to the infrastructure.

C.

the effectiveness of the control assurance framework.

D.

the resulting impact of that adverse event on the organization.

Questions # 8:

What things must be identified to define an attack vector?

Options:

A.

The platform, application, and data

B.

The attacker and the vulnerability

C.

The system, transport protocol, and target

D.

The source, processor, and content

Questions # 9:

Which of the following challenges to embedded system security can be addressed through ongoing, remote maintenance?

Options:

A.

Processors being overwhelmed by the demands of security processing

B.

Deploying updated firmware as vulnerabilities are discovered and addressed

C.

Resource constraints due to limitations on battery, memory, and other physical components

D.

Physical security attacks that take advantage of vulnerabilities in the hardware

Questions # 10:

What is an embedded system?

Options:

A.

A system that is located in a secure underground facility

B.

A system placed in a location and designed so it cannot be easily removed

C.

It provides computing services in a small form factor with limited processing power

D.

It safeguards the cryptographic infrastructure by storing keys inside a tamper-resistant external device

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions