Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the IIBA Cybersecurity Analysis IIBA-CCA Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Where SaaS is the delivery of a software service, what service does PaaS provide?

Options:

A.

Load Balancers


B.

Storage


C.

Subscriptions


D.

Operating System


Expert Solution
Questions # 2:

The opportunity cost of increased cybersecurity is that:

Options:

A.

cybersecurity adds considerably to the cost of developing new business systems.


B.

costs of meeting regulations are constantly increasing.


C.

the potential cost of implementing security will always be less than the potential risk from a breach of customer data.


D.

identifying and securing assets and systems requires resources that are therefore not available to other initiatives.


Expert Solution
Questions # 3:

NIST 800-30 defines cyber risk as a function of the likelihood of a given threat-source exercising a potential vulnerability, and:

Options:

A.

the pre-disposing conditions of the vulnerability.


B.

the probability of detecting damage to the infrastructure.


C.

the effectiveness of the control assurance framework.


D.

the resulting impact of that adverse event on the organization.


Expert Solution
Questions # 4:

What is defined as an internal computerized table of access rules regarding the levels of computer access permitted to login IDs and computer terminals?

Options:

A.

Access Control List


B.

Access Control Entry


C.

Relational Access Database


D.

Directory Management System


Expert Solution
Questions # 5:

If a Business Analyst is asked to document the current state of the organization's web-based business environment, and recommend where cost savings could be realized, what risk factor must be included in the analysis?

Options:

A.

Organizational Risk Tolerance


B.

Impact Severity


C.

Application Vulnerabilities


D.

Threat Likelihood


Expert Solution
Questions # 6:

ITIL Information Technology Infrastructure Library defines:

Options:

A.

a standard of best practices for IT Service Management.


B.

how technology and hardware systems interface securely with one another.


C.

the standard set of components used in every business technology system.


D.

a set of security requirements that every business technology system must meet.


Expert Solution
Questions # 7:

Analyst B has discovered multiple attempts from unauthorized users to access confidential data. This is most likely?

Options:

A.

Admin


B.

Hacker


C.

User


D.

IT Support


Expert Solution
Questions # 8:

Organizations who don't quantify this will likely miss opportunities toward achieving strategic goals and objectives:

Options:

A.

cybersecurity budget.


B.

control effectiveness.


C.

risk estimation.


D.

risk appetite.


Expert Solution
Questions # 9:

Controls that are put in place to address specific risks may include:

Options:

A.

only initial reviews.


B.

technology or process solutions.


C.

partial coverage of one or more risks.


D.

coverage for partial extent and scope of the risk.


Expert Solution
Questions # 10:

The process by which organizations assess the data they hold and the level of protection it should be given based on its risk to loss or harm from disclosure, is known as:

Options:

A.

vulnerability assessment.


B.

internal audit.


C.

information classification.


D.

information categorization.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions