Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

IIBA-CCA Questions and Answers

Question # 6

SSL/TLS encryption capability is provided by:

A.

certificates.

B.

protocols.

C.

passwords.

D.

controls.

Full Access
Question # 7

What is the purpose of Digital Rights Management DRM?

A.

To ensure that all attempts to access information are tracked, logged, and auditable

B.

To control the use, modification, and distribution of copyrighted works

C.

To ensure that corporate files and data cannot be accessed by unauthorized personnel

D.

To ensure that intellectual property remains under the full control of the originating enterprise

Full Access
Question # 8

What things must be identified to define an attack vector?

A.

The platform, application, and data

B.

The attacker and the vulnerability

C.

The system, transport protocol, and target

D.

The source, processor, and content

Full Access
Question # 9

Other than the Requirements Analysis document, in what project deliverable should Vendor Security Requirements be included?

A.

Training Plan

B.

Business Continuity Plan

C.

Project Charter

D.

Request For Proposals

Full Access
Question # 10

Separation of duties, as a security principle, is intended to:

A.

optimize security application performance.

B.

ensure that all security systems are integrated.

C.

balance user workload.

D.

prevent fraud and error.

Full Access
Question # 11

An internet-based organization whose address is not known has attempted to acquire personal identification details such as usernames and passwords by creating a fake website. This is an example of?

A.

Breach

B.

Phishing

C.

Threat

D.

Ransomware

Full Access
Question # 12

What operational practice would risk managers employ to demonstrate the effectiveness of security controls?

A.

Metrics Reporting

B.

Change Management

C.

Security Awareness Training

D.

Penetration Testing

Full Access
Question # 13

Why would a Business Analyst include current technology when documenting the current state business processes surrounding a solution being replaced?

A.

To ensure the future state business processes are included in user training

B.

To identify potential security impacts to integrated systems within the value chain

C.

To identify and meet internal security governance requirements

D.

To classify the data elements so that information confidentiality, integrity, and availability are protected

Full Access
Question # 14

What is defined as an internal computerized table of access rules regarding the levels of computer access permitted to login IDs and computer terminals?

A.

Access Control List

B.

Access Control Entry

C.

Relational Access Database

D.

Directory Management System

Full Access
Question # 15

Which capability would a solution option need to demonstrate in order to satisfy Logging Requirements?

A.

Facilitates Single Sign-On

B.

Records information about user access and actions in the system

C.

Integrates with Risk Logging software

D.

Offers both on-premise and as-a-service delivery options

Full Access
Question # 16

What should organizations do with Key Risk Indicator KRI and Key Performance Indicator KPI data to facilitate decision making, and improve performance and accountability?

A.

Achieve, reset, and evaluate

B.

Collect, analyze, and report

C.

Prioritize, falsify, and report

D.

Challenge, compare, and revise

Full Access
Question # 17

Which of the following activities are part of the business analyst’s role in ensuring compliance with security policies?

A.

Auditing enterprise security policies to ensure that they comply with regulations

B.

Ensuring that security policies are reflected in the solution requirements

C.

Testing applications to identify potential security holes

D.

Checking to ensure that business users follow the security requirements

Full Access
Question # 18

There are three states in which data can exist:

A.

at dead, in action, in use.

B.

at dormant, in mobile, in use.

C.

at sleep, in awake, in use.

D.

at rest, in transit, in use.

Full Access
Question # 19

Public & Private key pairs are an example of what technology?

A.

Virtual Private Network

B.

IoT

C.

Encryption

D.

Network Segregation

Full Access
Question # 20

What terms are often used to describe the relationship between a sub-directory and the directory in which it is cataloged?

A.

Primary and Secondary

B.

Multi-factor Tokens

C.

Parent and Child

D.

Embedded Layers

Full Access
Question # 21

What is an external audit?

A.

A review of security-related measures in place intended to identify possible vulnerabilities

B.

A process that the cybersecurity follows to ensure that they have implemented the proper controls

C.

A review of security expenditures by an independent party

D.

A review of security-related activities by an independent party to ensure compliance

Full Access
Question # 22

If a Business Analyst is asked to document the current state of the organization's web-based business environment, and recommend where cost savings could be realized, what risk factor must be included in the analysis?

A.

Organizational Risk Tolerance

B.

Impact Severity

C.

Application Vulnerabilities

D.

Threat Likelihood

Full Access