Spring Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

IIBA-CCA Sample Questions Answers

Questions 4

Which of the following challenges to embedded system security can be addressed through ongoing, remote maintenance?

Options:

A.

Processors being overwhelmed by the demands of security processing

B.

Deploying updated firmware as vulnerabilities are discovered and addressed

C.

Resource constraints due to limitations on battery, memory, and other physical components

D.

Physical security attacks that take advantage of vulnerabilities in the hardware

Buy Now
Questions 5

Which of the following would qualify as a multi-factor authentication pair?

Options:

A.

Thumbprint and Encryption

B.

Something You Know and Something You Are

C.

Password and Token

D.

Encryption and Password

Buy Now
Questions 6

Compliance with regulations is generally demonstrated through:

Options:

A.

independent audits of systems and security procedures.

B.

review of security requirements by senior executives and/or the Board.

C.

extensive QA testing prior to system implementation.

D.

penetration testing by ethical hackers.

Buy Now
Questions 7

The hash function supports data in transit by ensuring:

Options:

A.

validation that a message originated from a particular user.

B.

a message was modified in transit.

C.

a public key is transitioned into a private key.

D.

encrypted messages are not shared with another party.

Buy Now
Questions 8

ITIL Information Technology Infrastructure Library defines:

Options:

A.

a standard of best practices for IT Service Management.

B.

how technology and hardware systems interface securely with one another.

C.

the standard set of components used in every business technology system.

D.

a set of security requirements that every business technology system must meet.

Buy Now
Questions 9

What is an embedded system?

Options:

A.

A system that is located in a secure underground facility

B.

A system placed in a location and designed so it cannot be easily removed

C.

It provides computing services in a small form factor with limited processing power

D.

It safeguards the cryptographic infrastructure by storing keys inside a tamper-resistant external device

Buy Now
Questions 10

What term is defined as a fix to software programming errors and vulnerabilities?

Options:

A.

Control

B.

Release

C.

Log

D.

Patch

Buy Now
Questions 11

A significant benefit of role-based access is that it:

Options:

A.

simplifies the assignment of correct access levels to a user based on the work they will perform.

B.

makes it easier to audit and verify data access.

C.

ensures that employee accounts will be shut down on departure or role change.

D.

ensures that tasks and associated privileges for a specific business process are disseminated among multiple users.

Buy Now
Questions 12

Analyst B has discovered multiple attempts from unauthorized users to access confidential data. This is most likely?

Options:

A.

Admin

B.

Hacker

C.

User

D.

IT Support

Buy Now
Questions 13

Analyst B has discovered multiple sources which can harm the organization’s systems. What has she discovered?

Options:

A.

Breach

B.

Hacker

C.

Threat

D.

Ransomware

Buy Now
Questions 14

Cybersecurity regulations typically require that enterprises demonstrate that they can protect:

Options:

A.

applications and technology systems.

B.

trade secrets and other intellectual property.

C.

personal data of customers and employees.

D.

business continuity and disaster recovery.

Buy Now
Questions 15

What is the purpose of Digital Rights Management DRM?

Options:

A.

To ensure that all attempts to access information are tracked, logged, and auditable

B.

To control the use, modification, and distribution of copyrighted works

C.

To ensure that corporate files and data cannot be accessed by unauthorized personnel

D.

To ensure that intellectual property remains under the full control of the originating enterprise

Buy Now
Questions 16

NIST 800-30 defines cyber risk as a function of the likelihood of a given threat-source exercising a potential vulnerability, and:

Options:

A.

the pre-disposing conditions of the vulnerability.

B.

the probability of detecting damage to the infrastructure.

C.

the effectiveness of the control assurance framework.

D.

the resulting impact of that adverse event on the organization.

Buy Now
Questions 17

What common mitigation tool is used for directly handling or treating cyber risks?

Options:

A.

Exit Strategy

B.

Standards

C.

Control

D.

Business Continuity Plan

Buy Now
Questions 18

What risk factors should the analyst consider when assessing the Overall Likelihood of a threat?

Options:

A.

Attack Initiation Likelihood and Initiated Attack Success Likelihood

B.

Risk Level, Risk Impact, and Mitigation Strategy

C.

Overall Site Traffic and Commerce Volume

D.

Past Experience and Trends

Buy Now
Questions 19

The main phases of incident management are:

Options:

A.

awareness, interest, desire, action.

B.

reporting, investigation, assessment, corrective actions, review.

C.

initiation, planning, action, closing.

D.

assess, investigate, report, respond, legal compliance.

Buy Now
Questions 20

What is the first step of the forensic process?

Options:

A.

Reporting

B.

Examination

C.

Analysis

D.

Collection

Buy Now
Questions 21

What does non-repudiation mean in the context of web security?

Options:

A.

Ensuring that all traffic between web servers must be securely encrypted

B.

Providing permission to use web server resources according to security policies and specified procedures, so that the activity can be audited

C.

Ensuring that all data has not been altered in an unauthorized manner while being transmitted between web servers

D.

Providing the sender of a message with proof of delivery, and the receiver with proof of the sender's identity

Buy Now
Exam Code: IIBA-CCA
Exam Name: Certificate in Cybersecurity Analysis (CCA)
Last Update: Feb 18, 2026
Questions: 75
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now IIBA-CCA