Pass4Future also provide interactive practice exam software for preparing IIBA Certificate in Cybersecurity Analysis (IIBA-CCA) Exam effectively. You are welcome to explore sample free IIBA-CCA Exam questions below and also try IIBA-CCA Exam practice test software.
Do you know that you can access more real IIBA-CCA exam questions via Premium Access? ()
Analyst B has discovered multiple attempts from unauthorized users to access confidential data. This is most likely?
Answer : B
Multiple attempts by unauthorized users to access confidential data most closely aligns with activity from a hacker, meaning an unauthorized actor attempting to gain access to systems or information. Cybersecurity operations commonly observe this pattern as repeated login failures, password-spraying, credential-stuffing, brute-force attempts, repeated probing of restricted endpoints, or abnormal access requests against protected repositories. While ''user'' is too generic and could include authorized individuals, the question explicitly states ''unauthorized users,'' pointing to malicious or illegitimate actors. ''Admin'' and ''IT Support'' are roles typically associated with legitimate privileged access and operational troubleshooting; repeated unauthorized access attempts from those roles would be atypical and would still represent compromise or misuse rather than normal operations. Cybersecurity documentation often classifies these attempts as indicators of malicious intent and potential precursor events to a breach. Controls recommended to counter such activity include strong authentication (multi-factor authentication), account lockout and throttling policies, anomaly detection, IP reputation filtering, conditional access, least privilege, and monitoring of authentication logs for patterns across accounts and geographies. The key distinction is that repeated unauthorized attempts represent hostile behavior by an external or rogue actor, which is best described as a hacker in the provided options.
What common mitigation tool is used for directly handling or treating cyber risks?
Answer : C
In cybersecurity risk management, risk treatment is the set of actions used to reduce risk to an acceptable level. The most common tool used to directly treat or mitigate cyber risk is a control because controls are the specific safeguards that prevent, detect, or correct adverse events. Cybersecurity frameworks describe controls as measures implemented to reduce either the likelihood of a threat event occurring or the impact if it does occur. Controls can be technical (such as multifactor authentication, encryption, endpoint protection, network segmentation, logging and monitoring), administrative (policies, standards, training, access approvals, change management), or physical (badges, locks, facility protections). Regardless of type, controls are the direct mechanism used to mitigate identified risks.
An exit strategy is typically a vendor or outsourcing risk management concept focused on how to transition away from a provider or system; it supports resilience but is not the primary tool for directly mitigating a specific cyber risk. Standards guide consistency by defining required practices and configurations, but the standard itself is not the mitigation---controls implemented to meet the standard are. A business continuity plan supports availability and recovery after disruption, which is important, but it primarily addresses continuity and recovery rather than directly reducing the underlying cybersecurity risk in normal operations. Therefore, the best answer is the one that represents the direct implementation of safeguards: controls.
What is a Recovery Point Objective RPO?
Answer : A
A Recovery Point Objective defines the acceptable amount of data loss measured in time. It answers the question: ''After an outage or disruptive event, how far back in time can we restore data and still meet business needs?'' If the RPO is 4 hours, the organization is stating it can tolerate losing up to 4 hours of data changes, meaning backups, replication, journaling, or snapshots must be frequent enough to restore to a point no older than 4 hours before the incident. That is exactly what option A describes: the specific point in time prior to the outage to which data must be recovered.
RPO is often paired with Recovery Time Objective but they are not the same. RTO focuses on how quickly service must be restored, while RPO focuses on how much data the organization can afford to lose. Options B, C, and D all describe time-to-restore concepts, which align with RTO or related recovery targets rather than RPO.
In operational resilience and disaster recovery planning, RPO drives technical design choices: backup frequency, replication methods, storage and retention strategies, and validation testing. Lower RPO values generally require more robust and often more expensive solutions, such as near-real-time replication and strong change capture controls. RPO also influences incident response and recovery procedures to ensure restoration steps reliably meet the agreed data-loss tolerance.
Top of Form
Why would a Business Analyst include current technology when documenting the current state business processes surrounding a solution being replaced?
Answer : B
A Business Analyst documents current technology in the ''as-is'' state because business processes are rarely isolated; they depend on applications, interfaces, data exchanges, identity services, and shared infrastructure. From a cybersecurity perspective, replacing one solution can unintentionally change trust boundaries, authentication flows, authorization decisions, logging coverage, and data movement across integrated systems. Option B is correct because understanding the current technology landscape helps identify where security impacts may occur across the value chain, including upstream data providers, downstream consumers, third-party services, and internal platforms that rely on the existing system.
Cybersecurity documents emphasize that integration points are common attack surfaces. APIs, file transfers, message queues, single sign-on, batch jobs, and shared databases can introduce risks such as broken access control, insecure data transmission, data leakage, privilege escalation, and gaps in monitoring. If the BA captures current integrations, dependencies, and data flows, the delivery team can properly perform threat modeling, define security requirements, and avoid breaking compensating controls that other systems depend on. This also supports planning for secure decommissioning, migration, and cutover, ensuring credentials, keys, service accounts, and network paths are rotated or removed appropriately.
The other options are less precise for the question. Training is not the core driver for documenting current technology. Governance requirements apply broadly but do not explain why current tech must be included. Data classification is important, but it is a separate activity from capturing technology dependencies needed to assess integration security impacts.
How should categorization information be used in business impact analysis?
Answer : A
Security categorization (commonly based on confidentiality, integrity, and availability impact levels) is meant to reflect the level of harm that would occur if an information type or system is compromised. A business impact analysis, on the other hand, examines the operational and organizational consequences of disruptions or failures---such as loss of revenue, inability to deliver critical services, legal or regulatory exposure, reputational harm, and impacts to customers or individuals. Because these two activities look at impact from different but related perspectives, categorization information should be used during the BIA to confirm that the stated security categorization truly matches real business consequences.
Using categorization as an input helps analysts validate assumptions about criticality, sensitivity, and tolerance for downtime. If the BIA shows that outages or data compromise would produce greater harm than the existing categorization implies, that discrepancy signals under-classification and insufficient controls. Conversely, if the BIA demonstrates limited impact, it may indicate over-classification, potentially driving unnecessary cost and operational burden. Identifying these mismatches early supports better risk decisions, prioritization of recovery objectives, and selection of controls proportionate to actual impact.
The other options describe activities that may occur in architecture, governance, or project planning, but they are not the primary purpose of using categorization information in a BIA. The key value is reconciliation: aligning security impact levels with verified business impact.