Spring Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

IIBA-CCA Sample Questions Answers

Questions 4

Which of the following should be addressed by functional security requirements?

Options:

A.

System reliability

B.

User privileges

C.

Identified vulnerabilities

D.

Performance and stability

Buy Now
Questions 5

If a threat is expected to have a serious adverse effect, according to NIST SP 800-30 it would be rated with a severity level of:

Options:

A.

moderate.

B.

severe.

C.

severely low.

D.

very severe.

Buy Now
Questions 6

The process by which organizations assess the data they hold and the level of protection it should be given based on its risk to loss or harm from disclosure, is known as:

Options:

A.

vulnerability assessment.

B.

internal audit.

C.

information classification.

D.

information categorization.

Buy Now
Questions 7

Analyst B has discovered multiple attempts from unauthorized users to access confidential data. This is most likely?

Options:

A.

Admin

B.

Hacker

C.

User

D.

IT Support

Buy Now
Questions 8

Which of the following challenges to embedded system security can be addressed through ongoing, remote maintenance?

Options:

A.

Processors being overwhelmed by the demands of security processing

B.

Deploying updated firmware as vulnerabilities are discovered and addressed

C.

Resource constraints due to limitations on battery, memory, and other physical components

D.

Physical security attacks that take advantage of vulnerabilities in the hardware

Buy Now
Questions 9

Why is directory management important for cybersecurity?

Options:

A.

It prevents outside agents from viewing confidential company information

B.

It allows all application security to be managed through a single interface

C.

It prevents outsiders from knowing personal information about employees

D.

It controls access to folders and files on the network

Buy Now
Questions 10

The hash function supports data in transit by ensuring:

Options:

A.

validation that a message originated from a particular user.

B.

a message was modified in transit.

C.

a public key is transitioned into a private key.

D.

encrypted messages are not shared with another party.

Buy Now
Questions 11

Why would a Business Analyst include current technology when documenting the current state business processes surrounding a solution being replaced?

Options:

A.

To ensure the future state business processes are included in user training

B.

To identify potential security impacts to integrated systems within the value chain

C.

To identify and meet internal security governance requirements

D.

To classify the data elements so that information confidentiality, integrity, and availability are protected

Buy Now
Questions 12

NIST 800-30 defines cyber risk as a function of the likelihood of a given threat-source exercising a potential vulnerability, and:

Options:

A.

the pre-disposing conditions of the vulnerability.

B.

the probability of detecting damage to the infrastructure.

C.

the effectiveness of the control assurance framework.

D.

the resulting impact of that adverse event on the organization.

Buy Now
Questions 13

In the OSI model for network communication, the Session Layer is responsible for:

Options:

A.

establishing a connection and terminating it when it is no longer needed.

B.

presenting data to the receiver in a form that it recognizes.

C.

adding appropriate network addresses to packets.

D.

transmitting the data on the medium.

Buy Now
Questions 14

What is a Recovery Point Objective RPO?

Options:

A.

The point in time prior to the outage to which business and process data must be recovered

B.

The maximum time a system may be out of service before a significant business impact occurs

C.

The target time to restore a system without experiencing any significant business impact

D.

The target time to restore systems to operational status following an outage

Buy Now
Questions 15

Controls that are put in place to address specific risks may include:

Options:

A.

only initial reviews.

B.

technology or process solutions.

C.

partial coverage of one or more risks.

D.

coverage for partial extent and scope of the risk.

Buy Now
Questions 16

There are three states in which data can exist:

Options:

A.

at dead, in action, in use.

B.

at dormant, in mobile, in use.

C.

at sleep, in awake, in use.

D.

at rest, in transit, in use.

Buy Now
Questions 17

What is the purpose of Digital Rights Management DRM?

Options:

A.

To ensure that all attempts to access information are tracked, logged, and auditable

B.

To control the use, modification, and distribution of copyrighted works

C.

To ensure that corporate files and data cannot be accessed by unauthorized personnel

D.

To ensure that intellectual property remains under the full control of the originating enterprise

Buy Now
Questions 18

What is the first step of the forensic process?

Options:

A.

Reporting

B.

Examination

C.

Analysis

D.

Collection

Buy Now
Questions 19

Which scenario is an example of the principle of least privilege being followed?

Options:

A.

An application administrator has full permissions to only the applications they support

B.

All application and database administrators have full permissions to every application in the company

C.

Certain users are granted administrative access to their network account, in case they need to install a web-app

D.

A manager who is conducting performance appraisals is granted access to HR files for all employees

Buy Now
Questions 20

Analyst B has discovered unauthorized access to data. What has she discovered?

Options:

A.

Breach

B.

Hacker

C.

Threat

D.

Ransomware

Buy Now
Questions 21

What is a risk owner?

Options:

A.

The person accountable for resolving a risk

B.

The person who is responsible for creating the risk

C.

The person who will take the action to mitigate a risk

D.

The person who identified the risk

Buy Now
Questions 22

Compliance with regulations is generally demonstrated through:

Options:

A.

independent audits of systems and security procedures.

B.

review of security requirements by senior executives and/or the Board.

C.

extensive QA testing prior to system implementation.

D.

penetration testing by ethical hackers.

Buy Now
Exam Code: IIBA-CCA
Exam Name: Certificate in Cybersecurity Analysis (CCA)
Last Update: Apr 4, 2026
Questions: 75
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now IIBA-CCA