IIBA
IIBA-CCA
Q1:
What things must be identified to define an attack vector?
○
A
The platform, application, and data○
B
The attacker and the vulnerability○
C
The system, transport protocol, and target○
D
The source, processor, and content
IIBA
IIBA-CCA
Q2:
A significant benefit of role-based access is that it:
○
A
simplifies the assignment of correct access levels to a user based on the work they will perform.○
B
makes it easier to audit and verify data access.○
C
ensures that employee accounts will be shut down on departure or role change.○
D
ensures that tasks and associated privileges for a specific business process are disseminated among multiple users.
IIBA
IIBA-CCA
Q3:
How does Transport Layer Security ensure the reliability of a connection?
○
A
By ensuring a stateful connection between client and server○
B
By conducting a message integrity check to prevent loss or alteration of the message○
C
By ensuring communications use TCP/IP○
D
By using public and private keys to verify the identities of the parties to the data transfer
IIBA
IIBA-CCA
Q4:
Why is directory management important for cybersecurity?
○
A
It prevents outside agents from viewing confidential company information○
B
It allows all application security to be managed through a single interface○
C
It prevents outsiders from knowing personal information about employees○
D
It controls access to folders and files on the network
IIBA
IIBA-CCA
Q5:
What is defined as an internal computerized table of access rules regarding the levels of computer access permitted to login IDs and computer terminals?
○
A
Access Control List○
B
Access Control Entry○
C
Relational Access Database○
D
Directory Management System