Easter Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Pass CCOA Exam Guide

Page: 6 / 10
Total 139 questions

ISACA Certified Cybersecurity Operations Analyst Questions and Answers

Question 21

An organization continuously monitors enforcement of the least privilege principle and requires users and devices to re-authenticate at multiple levels of a system. Which type of security model has been adopted?

Options:

A.

Security-in-depth model

B.

Layered security model

C.

Zero Trust model

D.

Defense-in-depth model

Question 22

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Generate a SHA256 digest of the System-logs.evtx filewithin the win-webserver01_logs.zip file and providethe output below.

Options:

Question 23

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which of the following domain name(s) from the CCOAThreat Bulletin.pdf was contacted between 12:10 AMto 12:12 AM (Absolute) on August 17, 2024?

Options:

Question 24

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the contents of the file and save the output in atext file with a filename of pcap_artifact5_decoded.txton the Analyst Desktop.

Options:

Page: 6 / 10
Total 139 questions