Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IIBA-CCA Exam - Topic 6 Question 3 Discussion

Actual exam question for IIBA's IIBA-CCA exam
Question #: 3
Topic #: 6
[All IIBA-CCA Questions]

Cybersecurity regulations typically require that enterprises demonstrate that they can protect:

Show Suggested Answer Hide Answer
Suggested Answer: C

Cybersecurity regulations most commonly focus on the protection of personal data, because misuse or exposure can directly harm individuals through identity theft, fraud, discrimination, or loss of privacy. Privacy and data-protection laws typically require organizations to implement appropriate safeguards to protect personal information across its lifecycle, including collection, storage, processing, sharing, and disposal. In cybersecurity governance documentation, this obligation is often expressed through requirements to maintain confidentiality and integrity of personal data, limit access based on business need, and ensure accountability through logging, monitoring, and audits.

Demonstrating protection of personal data generally includes having a documented data classification scheme, clearly defined lawful purposes for processing, retention limits, and secure handling procedures. Technical controls commonly expected include strong authentication, least privilege and role-based access control, encryption for data at rest and in transit, secure key management, endpoint and server hardening, vulnerability management, and continuous monitoring for suspicious activity. Operational capabilities such as incident response, breach detection, and timely notification processes are also emphasized because regulators expect organizations to manage and report material data exposures appropriately.

While protecting applications, intellectual property, and ensuring continuity are important security objectives, they are not the primary focus of many cybersecurity regulations in the same consistent way as personal data protection. Therefore, the best answer is personal data of customers and employees.


Contribute your Thoughts:

0/2000 characters
Justine
1 day ago
I remember a practice question that emphasized trade secrets, but I feel like applications and systems are also crucial.
upvoted 0 times
...
Tanja
7 days ago
I think the focus is mostly on protecting personal data, but I’m not entirely sure if that’s the only requirement.
upvoted 0 times
...

Save Cancel