Easter Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Isaca CCOA Dumps Questions Answers

Page: 1 / 10
Total 139 questions

ISACA Certified Cybersecurity Operations Analyst Questions and Answers

Question 1

Which of the following is the BEST method of logical network segmentation?

Options:

A.

Encryption and tunneling

B.

IP address filtering and access control list (ACL)

C.

Virtual local area network (VLAN) tagging and isolation

D.

Physical separation of network devices

Buy Now
Question 2

Which of the following services would pose the GREATEST risk when used to permit access to and from the Internet?

Options:

A.

Server Message Block (5MB) on TCP 445

B.

File Transfer Protocol(FTP) on TCP 21

C.

Domain Name Service (DNS) on UOP 53

D.

Remote Desktop Protocol (RDP) on TCP 3389

Question 3

Which of the following BEST describes privilege escalation in the context of kernel security?

Options:

A.

A process by which an attacker gains unauthorized access to user data

B.

A security vulnerability in the operating system that triggers buffer overflows

C.

A type of code to inject malware into the kernel

D.

A technique used by attackers to bypass kernel-level security controls

Question 4

In the Open Systems Interconnection (OSI) Model for computer networking, which of the following is the function of the network layer?

Options:

A.

Facilitating communications with applications running on other computers

B.

Transmitting data segments between points on a network

C.

Translating data between a networking service and an application

D.

Structuring and managing a multi-node network

Question 5

What is the GREATEST security concern associated with virtual (nation technology?

Options:

A.

Inadequate resource allocation

B.

Insufficient isolation between virtual machines (VMs)

C.

Shared network access

D.

Missing patch management for the technology

Question 6

Which of the following has been defined when a disaster recovery plan (DRP) requires daily backups?

Options:

A.

Maximum tolerable downtime (MTD)

B.

Recovery time objective (RTO|

C.

Recovery point objective {RPO)

D.

Mean time to failure (MTTF)

Question 7

Which of the following is the MOST important reason to limit the number of users with local admin privileges on endpoints?

Options:

A.

Local admin users might Install unapproved software.

B.

Local admin accounts have elevated privileges that can be exploited by threat actors.

C.

local admin accounts require more administrative work in order to manage them properly.

D.

Local admin users might make unauthorized changes.

Question 8

Which types of network devices are MOST vulnerable due to age and complexity?

Options:

A.

Ethernet

B.

Mainframe technology

C.

Operational technology

D.

Wireless

Question 9

An attacker has compromised a number of systems on an organization'snetwork andisexfiltrationdata Usingthe Domain Name System (DNS) queries. Whichof the following is the BEST mitigation strategy to prevent data exfiltration using this technique?

mitigation strategy to prevent data exfiltration using this technique?

Options:

A.

Implement Secure Sockets Layer (SSL) encryption on the DNS server.

B.

Install a host-based Intrusion detection system (HIDS) on all systems in the network.

C.

Block all outbound DNS traffic from the network.

D.

Implement a DNS sinkhole to redirect alt DNS traffic to a dedicated server.

Question 10

An organization's financial data was compromised and posted online. The forensics review confirms proper access rights and encryption of the database at the host site. A lack of which of the following controls MOST likely caused the exposure?

Options:

A.

Continual backups

B.

Multi-factor authentication (MFA)

C.

Encryption o' data in transit

D.

Properly configured firewall

Question 11

Which of the following Is the MOST effective way to ensure an organization's management of supply chain risk remains consistent?

Options:

A.

Regularly seeking feedback from the procurement team regarding supplier responsiveness

B.

Periodically confirming suppliers' contractual obligations are met

C.

Periodically counting the number of incident tickets associated with supplier services

D.

Regularly meeting with suppliers to informally discuss Issues

Question 12

Which of the following is thePRIMARYsecurity benefit of working from a graphical user interface (GUI) instead of a command line interface (CLI)

Options:

A.

It Is easier to build encryption into the GUI.

B.

TheCLI commands do not need to be exact.

C.

Scripting is easier when using the GUI.

D.

AGUIprovides developers more flexibility.

Question 13

When identifying vulnerabilities, which of the following should a cybersecurity analyst determine FIRST?

Options:

A.

The number of vulnerabilities Identifiable by the scanning tool

B.

The numberof tested asset types included in the assessment

C.

The vulnerability categories possible for the tested asset types

D.

The vulnerability categories Identifiable by the scanning tool

Question 14

An organization's hosted database environment is encrypted by the vendor at rest and in transit. The database was accessed, and critical data was stolen. Which of the following is the MOST likely cause?

Options:

A.

Use of group rights for access

B.

Improper backup procedures

C.

Misconfigured access control list (ACL)

D.

Insufficiently strong encryption

Question 15

Which ofthe following is .1 PRIMARY output from the development of a cyber risk management strategy?

Options:

A.

Accepted processes are Identified.

B.

Business goals are communicated.

C.

Compliance implementation is optimized.

D.

Mitigation activities are defined.

Question 16

Which ofthe following is the PRIMARY purpose of load balancers in cloud networking?

Options:

A.

Distributing traffic between multiple servers

B.

Optimizing database queries

C.

Monitoring network traffic

D.

Load testing applications

Question 17

Which of the following network topologies is MOST resilient to network failures and can prevent a single point of failure?

Options:

A.

Mesh

B.

Star

C.

Bus

D.

Ring

Question 18

Which of the following is the PRIMARY purpose for an organization to adopt a cybersecurityframework?

Options:

A.

To ensure compliance with specific regulations

B.

To automate cybersecurity processes and reduce the need for human intervention

C.

To provide a standardized approach to cybetsecurity risk management

D.

To guarantee protection against possible cyber threats

Question 19

Which of the following should be considered FIRST when determining how to protect an organization's information assets?

Options:

A.

A prioritized Inventory of IT assets

B.

The organization's business model

C.

Results of vulnerability assessments

D.

The organization's risk reporting

Question 20

Which of the following MOST directly supports the cybersecurity objective of integrity?

Options:

A.

Data backups

B.

Digital signatures

C.

Least privilege

D.

Encryption

Question 21

An organization continuously monitors enforcement of the least privilege principle and requires users and devices to re-authenticate at multiple levels of a system. Which type of security model has been adopted?

Options:

A.

Security-in-depth model

B.

Layered security model

C.

Zero Trust model

D.

Defense-in-depth model

Question 22

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Generate a SHA256 digest of the System-logs.evtx filewithin the win-webserver01_logs.zip file and providethe output below.

Options:

Question 23

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which of the following domain name(s) from the CCOAThreat Bulletin.pdf was contacted between 12:10 AMto 12:12 AM (Absolute) on August 17, 2024?

Options:

Question 24

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the contents of the file and save the output in atext file with a filename of pcap_artifact5_decoded.txton the Analyst Desktop.

Options:

Question 25

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?

Options:

Question 26

For this question you must log into GreenboneVulnerability Manager using Firefox. The URL is: and credentials are:

Username:admin

Password:Secure-gvm!

A colleague performed a vulnerability scan but did notreview prior to leaving for a family emergency. It hasbeen determined that a threat actor is using CVE-2021-22145 in the wild. What is the host IP of the machinethat is vulnerable to this CVE?

Options:

Question 27

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the C2 host of the attack. Enter your responsebelow.

Options:

Question 28

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

What is the name of the suspected malicious filecaptured by keyword process.executable at 11:04 PM?

Options:

Question 29

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the name of the file containing the ransomwaredemand? Your response must include the fileextension.

Options:

Question 30

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which host IP was targeted during the following timeframe: 11:39 PM to 11:43 PM (Absolute) on August 16,2024?

Options:

Question 31

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

Use the IOCs to find the compromised host. Enter thehost name identified in the keyword agent.name fieldbelow.

Options:

Question 32

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the full User-Agent value associated with theransomware demand file download. Enter your responsein the field below.

Options:

Question 33

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

Based on the contents of the malscript.viruz.txt, whichthreat actor group is the malware associated with?

Options:

Question 34

Cyber Analyst Password:

For questions that require use of the SIEM, pleasereference the information below:

Security-Analyst!

CYB3R-4n4ly$t!

Email Address:

ccoatest@isaca.org

Password:Security-Analyst!

The enterprise has been receiving a large amount offalse positive alerts for the eternalblue vulnerability. TheSIEM rulesets are located in

/home/administrator/hids/ruleset/rules.

What is the name of the file containing the ruleset foreternalblue connections? Your response must includethe file extension.

Options:

Question 35

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

The following credentials are used for thisquestion.

Username:Accounting

Password:1x-4cc0unt1NG-x1

Using the provided credentials, SSH to the Accountingworkstation and generate a SHA256 checksum of the filethat triggered RuleName Suspicious PowerShell usingeither certutil or Get-FileHash of the file causing theissue. Copy the hash and paste it below.

Options:

Question 36

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Create a new case in Security Onion from the win-webserver01_logs.zip file. The case title is WindowsWebserver Logs - CCOA New Case and TLP must beset to Green. No additional fields are required.

Options:

Question 37

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

What is the name of the service that the malware attempts to install?

Options:

Question 38

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What is the filename of the webshell used to control thehost 10.10.44.200? Your response must include the fileextension.

Options:

Question 39

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many unique IPs have received well knownunencrypted web connections from the beginning of2022 to the end of 2023 (Absolute)?

Options:

Question 40

Question 1 and 2

You have been provided with authentication logs toinvestigate a potential incident. The file is titledwebserver-auth-logs.txt and located in theInvestigations folder on the Desktop.

Which IP address is performing a brute force attack?

What is the total number of successful authenticationsby the IP address performing the brute force attack?

Options:

Question 41

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the targets within the file pcap_artifact5.txt.

Select the correct decoded targets below.

10cal.com/exam

clOud-s3cure.com

c0c0nutf4rms.net

h3avy_s3as.biz

b4ddata.org

Options:

Page: 1 / 10
Total 139 questions