Spring Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

IIBA-CCA Certificate in Cybersecurity Analysis (CCA) Questions and Answers

Questions 4

What is an embedded system?

Options:

A.

A system that is located in a secure underground facility

B.

A system placed in a location and designed so it cannot be easily removed

C.

It provides computing services in a small form factor with limited processing power

D.

It safeguards the cryptographic infrastructure by storing keys inside a tamper-resistant external device

Buy Now
Questions 5

Certificates that provide SSL/TLS encryption capability:

Options:

A.

are similar to the unencrypted data.

B.

can be purchased from certificate authorities.

C.

are for data located on thumb drives.

D.

can provide authorization of data access.

Buy Now
Questions 6

A software product that supports threat detection, and compliance and security incident management, through the collection and analysis of security events and other data sources, is known as a:

Options:

A.

software as a service (SaaS).

B.

threat risk assessment (TRA).

C.

security information and event management system (SIEM).

D.

cloud access security broker (CASB).

Buy Now
Questions 7

Separation of duties, as a security principle, is intended to:

Options:

A.

optimize security application performance.

B.

ensure that all security systems are integrated.

C.

balance user workload.

D.

prevent fraud and error.

Buy Now
Questions 8

ITIL Information Technology Infrastructure Library defines:

Options:

A.

a standard of best practices for IT Service Management.

B.

how technology and hardware systems interface securely with one another.

C.

the standard set of components used in every business technology system.

D.

a set of security requirements that every business technology system must meet.

Buy Now
Questions 9

Which organizational resource category is known as "the first and last line of defense" from an attack?

Options:

A.

Firewalls

B.

Employees

C.

Endpoint Devices

D.

Classified Data

Buy Now
Questions 10

What is defined as an internal computerized table of access rules regarding the levels of computer access permitted to login IDs and computer terminals?

Options:

A.

Access Control List

B.

Access Control Entry

C.

Relational Access Database

D.

Directory Management System

Buy Now
Questions 11

What risk to information integrity is a Business Analyst aiming to minimize, by defining processes and procedures that describe interrelations between data sets in a data warehouse implementation?

Options:

A.

Unauthorized Access

B.

Confidentiality

C.

Data Aggregation

D.

Cross-Site Scripting

Buy Now
Questions 12

Public & Private key pairs are an example of what technology?

Options:

A.

Virtual Private Network

B.

IoT

C.

Encryption

D.

Network Segregation

Buy Now
Questions 13

What is a risk owner?

Options:

A.

The person accountable for resolving a risk

B.

The person who is responsible for creating the risk

C.

The person who will take the action to mitigate a risk

D.

The person who identified the risk

Buy Now
Questions 14

When attackers exploit human emotions and connection to gain access, what technique are they using?

Options:

A.

Social Engineering

B.

Phishing

C.

Tailgating

D.

Malware

Buy Now
Questions 15

Analyst B has discovered unauthorized access to data. What has she discovered?

Options:

A.

Breach

B.

Hacker

C.

Threat

D.

Ransomware

Buy Now
Questions 16

If a threat is expected to have a serious adverse effect, according to NIST SP 800-30 it would be rated with a severity level of:

Options:

A.

moderate.

B.

severe.

C.

severely low.

D.

very severe.

Buy Now
Questions 17

What term is defined as a fix to software programming errors and vulnerabilities?

Options:

A.

Control

B.

Release

C.

Log

D.

Patch

Buy Now
Questions 18

What operational practice would risk managers employ to demonstrate the effectiveness of security controls?

Options:

A.

Metrics Reporting

B.

Change Management

C.

Security Awareness Training

D.

Penetration Testing

Buy Now
Questions 19

The process by which organizations assess the data they hold and the level of protection it should be given based on its risk to loss or harm from disclosure, is known as:

Options:

A.

vulnerability assessment.

B.

internal audit.

C.

information classification.

D.

information categorization.

Buy Now
Questions 20

A significant benefit of role-based access is that it:

Options:

A.

simplifies the assignment of correct access levels to a user based on the work they will perform.

B.

makes it easier to audit and verify data access.

C.

ensures that employee accounts will be shut down on departure or role change.

D.

ensures that tasks and associated privileges for a specific business process are disseminated among multiple users.

Buy Now
Questions 21

Which organizational area would drive a cybersecurity infrastructure Business Case?

Options:

A.

Risk

B.

IT

C.

Legal

D.

Finance

Buy Now
Questions 22

An internet-based organization whose address is not known has attempted to acquire personal identification details such as usernames and passwords by creating a fake website. This is an example of?

Options:

A.

Breach

B.

Phishing

C.

Threat

D.

Ransomware

Buy Now
Exam Code: IIBA-CCA
Exam Name: Certificate in Cybersecurity Analysis (CCA)
Last Update: Feb 20, 2026
Questions: 75
IIBA-CCA pdf

IIBA-CCA PDF

$25.5  $84.99
IIBA-CCA Engine

IIBA-CCA Testing Engine

$30  $99.99
IIBA-CCA PDF + Engine

IIBA-CCA PDF + Testing Engine

$40.5  $134.99