Easter Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Legit CCOA Exam Download

Page: 4 / 10
Total 139 questions

ISACA Certified Cybersecurity Operations Analyst Questions and Answers

Question 13

When identifying vulnerabilities, which of the following should a cybersecurity analyst determine FIRST?

Options:

A.

The number of vulnerabilities Identifiable by the scanning tool

B.

The numberof tested asset types included in the assessment

C.

The vulnerability categories possible for the tested asset types

D.

The vulnerability categories Identifiable by the scanning tool

Question 14

An organization's hosted database environment is encrypted by the vendor at rest and in transit. The database was accessed, and critical data was stolen. Which of the following is the MOST likely cause?

Options:

A.

Use of group rights for access

B.

Improper backup procedures

C.

Misconfigured access control list (ACL)

D.

Insufficiently strong encryption

Question 15

Which ofthe following is .1 PRIMARY output from the development of a cyber risk management strategy?

Options:

A.

Accepted processes are Identified.

B.

Business goals are communicated.

C.

Compliance implementation is optimized.

D.

Mitigation activities are defined.

Question 16

Which ofthe following is the PRIMARY purpose of load balancers in cloud networking?

Options:

A.

Distributing traffic between multiple servers

B.

Optimizing database queries

C.

Monitoring network traffic

D.

Load testing applications

Page: 4 / 10
Total 139 questions