Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

IIBA-CCA Certificate in Cybersecurity Analysis (CCA) Questions and Answers

Questions 4

Where business process diagrams can be used to identify vulnerabilities within solution processes, what tool can be used to identify vulnerabilities within solution technology?

Options:

A.

Vulnerability-as-a-Service

B.

Penetration Test

C.

Security Patch

D.

Smoke Test

Buy Now
Questions 5

What is an external audit?

Options:

A.

A review of security-related measures in place intended to identify possible vulnerabilities

B.

A process that the cybersecurity follows to ensure that they have implemented the proper controls

C.

A review of security expenditures by an independent party

D.

A review of security-related activities by an independent party to ensure compliance

Buy Now
Questions 6

Other than the Requirements Analysis document, in what project deliverable should Vendor Security Requirements be included?

Options:

A.

Training Plan

B.

Business Continuity Plan

C.

Project Charter

D.

Request For Proposals

Buy Now
Questions 7

Where SaaS is the delivery of a software service, what service does PaaS provide?

Options:

A.

Load Balancers

B.

Storage

C.

Subscriptions

D.

Operating System

Buy Now
Questions 8

Protecting data at rest secures data that is:

Options:

A.

moving from device to device.

B.

moving from network to network.

C.

stored on any device or network.

D.

less vulnerable to attack.

Buy Now
Questions 9

Separation of duties, as a security principle, is intended to:

Options:

A.

optimize security application performance.

B.

ensure that all security systems are integrated.

C.

balance user workload.

D.

prevent fraud and error.

Buy Now
Questions 10

The process by which organizations assess the data they hold and the level of protection it should be given based on its risk to loss or harm from disclosure, is known as:

Options:

A.

vulnerability assessment.

B.

internal audit.

C.

information classification.

D.

information categorization.

Buy Now
Questions 11

What is an embedded system?

Options:

A.

A system that is located in a secure underground facility

B.

A system placed in a location and designed so it cannot be easily removed

C.

It provides computing services in a small form factor with limited processing power

D.

It safeguards the cryptographic infrastructure by storing keys inside a tamper-resistant external device

Buy Now
Questions 12

What risk to information integrity is a Business Analyst aiming to minimize, by defining processes and procedures that describe interrelations between data sets in a data warehouse implementation?

Options:

A.

Unauthorized Access

B.

Confidentiality

C.

Data Aggregation

D.

Cross-Site Scripting

Buy Now
Questions 13

What is the definition of privileged account management?

Options:

A.

Establishing and maintaining access rights and controls for users who require elevated privileges to an entity for an administrative or support function

B.

Applying identity and access management controls

C.

Managing senior leadership and executive accounts

D.

Managing independent authentication of accounts

Buy Now
Questions 14

Organizations who don't quantify this will likely miss opportunities toward achieving strategic goals and objectives:

Options:

A.

cybersecurity budget.

B.

control effectiveness.

C.

risk estimation.

D.

risk appetite.

Buy Now
Questions 15

Which capability would a solution option need to demonstrate in order to satisfy Logging Requirements?

Options:

A.

Facilitates Single Sign-On

B.

Records information about user access and actions in the system

C.

Integrates with Risk Logging software

D.

Offers both on-premise and as-a-service delivery options

Buy Now
Questions 16

Which statement is true about a data warehouse?

Options:

A.

Data stored in a data warehouse is used for analytical purposes, not operational tasks

B.

The data warehouse must use the same data structures as production systems

C.

Data warehouses should act as a central repository for the data generated by all operational systems

D.

Data cleaning must be done on operational systems before the data is transferred to a data warehouse

Buy Now
Questions 17

What term is defined as a fix to software programming errors and vulnerabilities?

Options:

A.

Control

B.

Release

C.

Log

D.

Patch

Buy Now
Questions 18

Which scenario is an example of the principle of least privilege being followed?

Options:

A.

An application administrator has full permissions to only the applications they support

B.

All application and database administrators have full permissions to every application in the company

C.

Certain users are granted administrative access to their network account, in case they need to install a web-app

D.

A manager who is conducting performance appraisals is granted access to HR files for all employees

Buy Now
Questions 19

What is the purpose of Digital Rights Management DRM?

Options:

A.

To ensure that all attempts to access information are tracked, logged, and auditable

B.

To control the use, modification, and distribution of copyrighted works

C.

To ensure that corporate files and data cannot be accessed by unauthorized personnel

D.

To ensure that intellectual property remains under the full control of the originating enterprise

Buy Now
Questions 20

Which of the following terms represents an accidental exploitation of a vulnerability?

Options:

A.

Threat

B.

Agent

C.

Event

D.

Response

Buy Now
Questions 21

What is the "impact" in the context of cybersecurity risk?

Options:

A.

The potential for violation of privacy laws and regulations from a cybersecurity breach

B.

The financial costs to the organization resulting from a breach

C.

The probability that a breach will occur within a given period of time

D.

The magnitude of harm that can be expected from unauthorized information use

Buy Now
Questions 22

What stage of incident management would "strengthen the security from lessons learned" fall into?

Options:

A.

Response

B.

Recovery

C.

Detection

D.

Remediation

Buy Now
Exam Code: IIBA-CCA
Exam Name: Certificate in Cybersecurity Analysis (CCA)
Last Update: Apr 5, 2026
Questions: 75

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99