Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free IIBA IIBA-CCA Practice Exam with Questions & Answers

Questions 1

What term is defined as a fix to software programming errors and vulnerabilities?

Options:
A.

Control

B.

Release

C.

Log

D.

Patch

IIBA IIBA-CCA Premium Access
Questions 2

There are three states in which data can exist:

Options:
A.

at dead, in action, in use.

B.

at dormant, in mobile, in use.

C.

at sleep, in awake, in use.

D.

at rest, in transit, in use.

Questions 3

Where business process diagrams can be used to identify vulnerabilities within solution processes, what tool can be used to identify vulnerabilities within solution technology?

Options:
A.

Vulnerability-as-a-Service

B.

Penetration Test

C.

Security Patch

D.

Smoke Test

Questions 4

What stage of incident management would "strengthen the security from lessons learned" fall into?

Options:
A.

Response

B.

Recovery

C.

Detection

D.

Remediation

Questions 5

What is a risk owner?

Options:
A.

The person accountable for resolving a risk

B.

The person who is responsible for creating the risk

C.

The person who will take the action to mitigate a risk

D.

The person who identified the risk

Questions 6

What is the "impact" in the context of cybersecurity risk?

Options:
A.

The potential for violation of privacy laws and regulations from a cybersecurity breach

B.

The financial costs to the organization resulting from a breach

C.

The probability that a breach will occur within a given period of time

D.

The magnitude of harm that can be expected from unauthorized information use

Questions 7

ITIL Information Technology Infrastructure Library defines:

Options:
A.

a standard of best practices for IT Service Management.

B.

how technology and hardware systems interface securely with one another.

C.

the standard set of components used in every business technology system.

D.

a set of security requirements that every business technology system must meet.

Questions 8

How is a risk score calculated?

Options:
A.

Based on the confidentiality, integrity, and availability characteristics of the system

B.

Based on the combination of probability and impact

C.

Based on past experience regarding the risk

D.

Based on an assessment of threats by the cyber security team

Questions 9

Which of the following is a cybersecurity risk that should be addressed by business analysis during solution development?

Options:
A.

Project budgets may prevent developers from implementing the full set of security measures

B.

QA may fail to identify all possible security vulnerabilities during system testing

C.

The solution may not be understood well enough to reliably identify security risks

D.

Code may be implemented in ways that introduce new vulnerabilities

Questions 10

Public & Private key pairs are an example of what technology?

Options:
A.

Virtual Private Network

B.

IoT

C.

Encryption

D.

Network Segregation