Spring Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 3
Total 22 questions
Exam Code: IIBA-CCA                Update: Apr 5, 2026
Exam Name: Certificate in Cybersecurity Analysis (CCA)

IIBA Certificate in Cybersecurity Analysis (CCA) IIBA-CCA Exam Dumps: Updated Questions & Answers (April 2026)

Question # 1

Analyst B has discovered unauthorized access to data. What has she discovered?

A.

Breach

B.

Hacker

C.

Threat

D.

Ransomware

Question # 2

An internet-based organization whose address is not known has attempted to acquire personal identification details such as usernames and passwords by creating a fake website. This is an example of?

A.

Breach

B.

Phishing

C.

Threat

D.

Ransomware

Question # 3

Which organizational area would drive a cybersecurity infrastructure Business Case?

A.

Risk

B.

IT

C.

Legal

D.

Finance

Question # 4

A significant benefit of role-based access is that it:

A.

simplifies the assignment of correct access levels to a user based on the work they will perform.

B.

makes it easier to audit and verify data access.

C.

ensures that employee accounts will be shut down on departure or role change.

D.

ensures that tasks and associated privileges for a specific business process are disseminated among multiple users.

Question # 5

The process by which organizations assess the data they hold and the level of protection it should be given based on its risk to loss or harm from disclosure, is known as:

A.

vulnerability assessment.

B.

internal audit.

C.

information classification.

D.

information categorization.

Question # 6

What operational practice would risk managers employ to demonstrate the effectiveness of security controls?

A.

Metrics Reporting

B.

Change Management

C.

Security Awareness Training

D.

Penetration Testing

Question # 7

What term is defined as a fix to software programming errors and vulnerabilities?

A.

Control

B.

Release

C.

Log

D.

Patch

Question # 8

If a threat is expected to have a serious adverse effect, according to NIST SP 800-30 it would be rated with a severity level of:

A.

moderate.

B.

severe.

C.

severely low.

D.

very severe.

Question # 9

When attackers exploit human emotions and connection to gain access, what technique are they using?

A.

Social Engineering

B.

Phishing

C.

Tailgating

D.

Malware

Question # 10

What is defined as an internal computerized table of access rules regarding the levels of computer access permitted to login IDs and computer terminals?

A.

Access Control List

B.

Access Control Entry

C.

Relational Access Database

D.

Directory Management System

Page: 1 / 3
Total 22 questions

Most Popular Certification Exams

Payment

       

Contact us

Site Secure

mcafee secure

TESTED 05 Apr 2026