Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free IIBA IIBA-CCA Practice Exam with Questions & Answers | Set: 2

Questions 11

Other than the Requirements Analysis document, in what project deliverable should Vendor Security Requirements be included?

Options:
A.

Training Plan

B.

Business Continuity Plan

C.

Project Charter

D.

Request For Proposals

IIBA IIBA-CCA Premium Access
Questions 12

If a system contains data with differing security categories, how should this be addressed in the categorization process?

Options:
A.

Security for the system should be in line with the highest impact value across all categories

B.

The data should be segregated across multiple systems so that they can have the appropriate security level for each

C.

The data types should be merged into a single category and reevaluated

D.

Security for the system should be in line with the lowest impact value across all categories

Questions 13

How does Transport Layer Security ensure the reliability of a connection?

Options:
A.

By ensuring a stateful connection between client and server

B.

By conducting a message integrity check to prevent loss or alteration of the message

C.

By ensuring communications use TCP/IP

D.

By using public and private keys to verify the identities of the parties to the data transfer

Questions 14

Why is directory management important for cybersecurity?

Options:
A.

It prevents outside agents from viewing confidential company information

B.

It allows all application security to be managed through a single interface

C.

It prevents outsiders from knowing personal information about employees

D.

It controls access to folders and files on the network

Questions 15

What is a Recovery Point Objective RPO?

Options:
A.

The point in time prior to the outage to which business and process data must be recovered

B.

The maximum time a system may be out of service before a significant business impact occurs

C.

The target time to restore a system without experiencing any significant business impact

D.

The target time to restore systems to operational status following an outage

Questions 16

What is risk mitigation?

Options:
A.

Reducing the risk by implementing one or more countermeasures

B.

Purchasing insurance against a cybersecurity breach

C.

Eliminating the risk by stopping the activity which causes risk

D.

Documenting the risk in full and preparing a recovery plan

Questions 17

Which of the following should be addressed in the organization's risk management strategy?

Options:
A.

Acceptable risk management methodologies

B.

Controls for each IT asset

C.

Processes for responding to a security breach

D.

Assignment of an executive responsible for risk management across the organization

Questions 18

What things must be identified to define an attack vector?

Options:
A.

The platform, application, and data

B.

The attacker and the vulnerability

C.

The system, transport protocol, and target

D.

The source, processor, and content

Questions 19

Which statement is true about a data warehouse?

Options:
A.

Data stored in a data warehouse is used for analytical purposes, not operational tasks

B.

The data warehouse must use the same data structures as production systems

C.

Data warehouses should act as a central repository for the data generated by all operational systems

D.

Data cleaning must be done on operational systems before the data is transferred to a data warehouse

Questions 20

What is defined as an internal computerized table of access rules regarding the levels of computer access permitted to login IDs and computer terminals?

Options:
A.

Access Control List

B.

Access Control Entry

C.

Relational Access Database

D.

Directory Management System