Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

Isaca CCOA Dumps

Page: 1 / 14
Total 139 questions

ISACA Certified Cybersecurity Operations Analyst Questions and Answers

Question 1

What is the GREATEST security concern associated with virtual (nation technology?

Options:

A.

Inadequate resource allocation

B.

Insufficient isolation between virtual machines (VMs)

C.

Shared network access

D.

Missing patch management for the technology

Question 2

Which of the following is foundational for implementing a Zero Trust model?

Options:

A.

Comprehensive process documentation

B.

Robust network monitoring

C.

Routine vulnerability and penetration testing

D.

Identity and access management (IAM) controls

Question 3

The Platform as a Service (PaaS) model is often used to support which of the following?

Options:

A.

Efficient application development and management

B.

Local on-premise management of products and services

C.

Subscription-based pay peruse applications

D.

Control over physical equipment running application developed In-house

Question 4

Which of the following should be the ULTIMATE outcome of adopting enterprise governance of information and technology in cybersecurity?

Options:

A.

Business resilience

B.

Risk optimization

C.

Resource optimization

D.

Value creation

Question 5

During a post-mortem incident review meeting, it is noted that a malicious attacker attempted to achieve network persistence by using vulnerabilities that appeared to be lower risk but ultimately allowed the attacker to escalate their privileges. Which ofthe following did the attacker MOST likely apply?

Options:

A.

Exploit chaining

B.

Brute force attack

C.

Cross-site scripting

D.

Deployment of rogue wireless access points

Question 6

Which of the following cyber crime tactics involves targets being contacted via text message by an attacker posing as a legitimate entity?

Options:

A.

Hacking

B.

Vishing

C.

Smishing

D.

Cyberstalking

Question 7

Which of the following network topologies is MOST resilient to network failures and can prevent a single point of failure?

Options:

A.

Mesh

B.

Star

C.

Bus

D.

Ring

Question 8

Which of the following BEST offers data encryption, authentication, and integrity of data flowing between a server and the client?

Options:

A.

Secure Sockets Layer (SSL)

B.

Kerbcros

C.

Transport Layer Security (TLS)

D.

Simple Network Management Protocol (SNMP)

Question 9

Which of the following MOST directly supports the cybersecurity objective of integrity?

Options:

A.

Data backups

B.

Digital signatures

C.

Least privilege

D.

Encryption

Question 10

Which ofthe following is the PRIMARY purpose of load balancers in cloud networking?

Options:

A.

Distributing traffic between multiple servers

B.

Optimizing database queries

C.

Monitoring network traffic

D.

Load testing applications

Question 11

Which of the following is the GREATEST risk resulting from a Domain Name System (DNS) cache poisoning attack?

Options:

A.

Reduced system availability

B.

Noncompliant operations

C.

Loss of network visibility

D.

Loss of sensitive data

Question 12

Which of the following roles is responsible for approving exceptions to and deviations from the incident management team charter on an ongoing basis?

Options:

A.

Security steering group

B.

Cybersecurity analyst

C.

Chief information security officer (CISO)

D.

Incident response manager

Question 13

Which ofthe following BEST enables a cybersecurity analyst to influence the acceptance of effective security controls across an organization?

Options:

A.

Contingency planning expertise

B.

Knowledge of cybersecurity standards

C.

Communication skills

D.

Critical thinking

Question 14

An organization has received complaints from a number of its customers that their data has been breached. However, after an investigation, the organization cannot detect any indicators of compromise. The breach was MOST likely due to which type of attack?

Options:

A.

Supply chain attack

B.

Zero-day attack

C.

injection attack

D.

Man-in the-middle attack

Question 15

Which of the following should occur FIRST during the vulnerability identification phase?

Options:

A.

Inform relevant stakeholders that vulnerability scanning will be taking place.

B.

Run vulnerability scans of all in-scope assets.

C.

Determine the categories of vulnerabilities possible for the type of asset being tested.

D.

Assess the risks associated with the vulnerabilities Identified.

Question 16

In which phase of the Cyber Kill Chain" would a red team run a network and port scan with Nmap?

Options:

A.

Exploitation

B.

Delivery

C.

Reconnaissance

D.

Weaponization

Question 17

Which of the following is the BEST method for hardening an operating system?

Options:

A.

Implementing a host Intrusion detection system (HIOS)

B.

Manually signing all drivers and applications

C.

Removing unnecessary services and applications

D.

Applying only critical updates

Question 18

Which of the following is the PRIMARY risk associated with cybercriminals eavesdropping on unencrypted network traffic?

Options:

A.

Data notification

B.

Data exfiltration

C.

Data exposure

D.

Data deletion

Question 19

Which of the following would BCST enable an organization to prioritize remediation activities when multiple vulnerabilities are identified?

Options:

A.

Business Impact analysis (BIA)

B.

Vulnerability exception process

C.

executive reporting process

D.

Risk assessment

Question 20

As part of a penetration testing program, which team facilitates education and training of architects and developers to encourage better security and awareness?

Options:

A.

Orange team

B.

Red team

C.

Green team

D.

Yellow team

Question 21

A bank employee is found to beexfiltrationsensitive information by uploading it via email. Which of the following security measures would be MOST effective in detecting this type of insider threat?

Options:

A.

Data loss prevention (DIP)

B.

Intrusion detection system (IDS)

C.

Network segmentation

D.

Security information and event management (SIEM)

Question 22

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many logs are associated with well knownunencrypted web traffic for the month of December2023 (Absolute)? Note: Security Onion refers to logsas documents.

Options:

Question 23

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

Perform a query of startup items for the agent.nameaccounting-pc in the SIEM for the last 24 hours. Identifythe file name that triggered RuleName SuspiciousPowerShell. Enter your response below. Your responsemust include the file extension.

Options:

Question 24

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?

Options:

Question 25

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the C2 host of the attack. Enter your responsebelow.

Options:

Question 26

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many unique IPs have received well knownunencrypted web connections from the beginning of2022 to the end of 2023 (Absolute)?

Options:

Question 27

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

What is the name of the service that the malware attempts to install?

Options:

Question 28

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

What is the name of the suspected malicious filecaptured by keyword process.executable at 11:04 PM?

Options:

Question 29

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

Based on the contents of the malscript.viruz.txt, whichthreat actor group is the malware associated with?

Options:

Question 30

For this question you must log into GreenboneVulnerability Manager using Firefox. The URL is: and credentials are:

Username:admin

Password:Secure-gvm!

A colleague performed a vulnerability scan but did notreview prior to leaving for a family emergency. It hasbeen determined that a threat actor is using CVE-2021-22145 in the wild. What is the host IP of the machinethat is vulnerable to this CVE?

Options:

Question 31

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What is the filename of the webshell used to control thehost 10.10.44.200? Your response must include the fileextension.

Options:

Question 32

Cyber Analyst Password:

For questions that require use of the SIEM, pleasereference the information below:

Security-Analyst!

CYB3R-4n4ly$t!

Email Address:

ccoatest@isaca.org

Password:Security-Analyst!

The enterprise has been receiving a large amount offalse positive alerts for the eternalblue vulnerability. TheSIEM rulesets are located in

/home/administrator/hids/ruleset/rules.

What is the name of the file containing the ruleset foreternalblue connections? Your response must includethe file extension.

Options:

Question 33

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

The following credentials are used for thisquestion.

Username:Accounting

Password:1x-4cc0unt1NG-x1

Using the provided credentials, SSH to the Accountingworkstation and generate a SHA256 checksum of the filethat triggered RuleName Suspicious PowerShell usingeither certutil or Get-FileHash of the file causing theissue. Copy the hash and paste it below.

Options:

Question 34

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which of the following domain name(s) from the CCOAThreat Bulletin.pdf was contacted between 12:10 AMto 12:12 AM (Absolute) on August 17, 2024?

Options:

Question 35

Question 1 and 2

You have been provided with authentication logs toinvestigate a potential incident. The file is titledwebserver-auth-logs.txt and located in theInvestigations folder on the Desktop.

Which IP address is performing a brute force attack?

What is the total number of successful authenticationsby the IP address performing the brute force attack?

Options:

Question 36

Which ruleset can be applied in the

/home/administrator/hids/ruleset/rules directory?

Double-click each image to view it larger.

as

as

as

Options:

Question 37

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the name of the file containing the ransomwaredemand? Your response must include the fileextension.

Options:

Question 38

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the targets within the file pcap_artifact5.txt.

Select the correct decoded targets below.

10cal.com/exam

clOud-s3cure.com

c0c0nutf4rms.net

h3avy_s3as.biz

b4ddata.org

Options:

Question 39

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which host IP was targeted during the following timeframe: 11:39 PM to 11:43 PM (Absolute) on August 16,2024?

Options:

Question 40

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What date was the webshell accessed? Enter the formatas YYYY-MM-DD.

Options:

Question 41

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Generate a SHA256 digest of the System-logs.evtx filewithin the win-webserver01_logs.zip file and providethe output below.

Options:

Question 42

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the name of the file containing the ransomwaredemand? Your response must include the fileextension.

Options:

Question 43

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the targets within the file pcap_artifact5.txt.

Select the correct decoded targets below.

10cal.com/exam

clOud-s3cure.com

c0c0nutf4rms.net

h3avy_s3as.biz

b4ddata.org

Options:

Question 44

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

Based on the contents of the malscript.viruz.txt, whichthreat actor group is the malware associated with?

Options:

Question 45

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many unique IPs have received well knownunencrypted web connections from the beginning of2022 to the end of 2023 (Absolute)?

Options:

Question 46

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the C2 host of the attack. Enter your responsebelow.

Options:

Question 47

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

The following credentials are used for thisquestion.

Username:Accounting

Password:1x-4cc0unt1NG-x1

Using the provided credentials, SSH to the Accountingworkstation and generate a SHA256 checksum of the filethat triggered RuleName Suspicious PowerShell usingeither certutil or Get-FileHash of the file causing theissue. Copy the hash and paste it below.

Options:

Question 48

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

What is the name of the suspected malicious filecaptured by keyword process.executable at 11:04 PM?

Options:

Question 49

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many logs are associated with well knownunencrypted web traffic for the month of December2023 (Absolute)? Note: Security Onion refers to logsas documents.

Options:

Question 50

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the full User-Agent value associated with theransomware demand file download. Enter your responsein the field below.

Options:

Question 51

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?

Options:

Question 52

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

Use the IOCs to find the compromised host. Enter thehost name identified in the keyword agent.name fieldbelow.

Options:

Question 53

An organization continuously monitors enforcement of the least privilege principle and requires users and devices to re-authenticate at multiple levels of a system. Which type of security model has been adopted?

Options:

A.

Security-in-depth model

B.

Layered security model

C.

Zero Trust model

D.

Defense-in-depth model

Question 54

In which phase of the Cyber Kill Chain" would a red team run a network and port scan with Nmap?

Options:

A.

Exploitation

B.

Delivery

C.

Reconnaissance

D.

Weaponization

Question 55

Which of the following is the BEST method for hardening an operating system?

Options:

A.

Implementing a host Intrusion detection system (HIOS)

B.

Manually signing all drivers and applications

C.

Removing unnecessary services and applications

D.

Applying only critical updates

Question 56

Which of the following MOST effectively minimizes the impact of a control failure?

Options:

A.

Business continuityplan [BCP

B.

Business impact analysis (B1A)

C.

Defense in depth

D.

Information security policy

Question 57

Which ofthe following is a type of middleware used to manage distributed transactions?

Options:

A.

Message-oriented middleware

B.

Transaction processing monitor

C.

Remote procedure call

D.

Object request broker

Question 58

Which of the following is the MOST effective way to prevent man-in-the-middle attacks?

Options:

A.

Changing passwords regularly

B.

Implementing firewalls on the network

C.

Implementing end-to-end encryption

D.

Enabling two-factor authentication

Question 59

Which of the following is MOST likely to result from a poorly enforced bring your own device (8YOD) policy?

Options:

A.

Weak passwords

B.

Network congestion

C.

Shadow IT

D.

Unapproved social media posts

Question 60

An organization has received complaints from a number of its customers that their data has been breached. However, after an investigation, the organization cannot detect any indicators of compromise. The breach was MOST likely due to which type of attack?

Options:

A.

Supply chain attack

B.

Zero-day attack

C.

injection attack

D.

Man-in the-middle attack

Question 61

When reviewing encryption applied to data within an organization's databases, a cybersecurity analyst notices that some databases use the encryption algorithms SHA-1 or 3-DES while others use AES-256. Which algorithm should the analyst recommend be used?

Options:

A.

AES-256

B.

TLS 1.1

C.

SHA-1

D.

DES

Question 62

Which of the following is the BEST way for an organization to balance cybersecurity risks and address compliance requirements?

Options:

A.

Accept that compliance requirements may conflict with business needs and operate in a diminished capacity to achieve compliance.

B.

Meet the minimum standards for the compliance requirements to ensure minimal impact to business operations,

C.

Evaluate compliance requirements in thecontext at business objectives to ensure requirements can be implemented appropriately.

D.

Implement only the compliance requirements that do not Impede business functions or affect cybersecurity risk.

Question 63

Which of the following is a security feature provided by the WS-Security extension in the Simple Object Access Protocol (SOAP)?

Options:

A.

Transport Layer Security (TLS)

B.

Message confidentiality

C.

MaIware protection

D.

Session management

Question 64

Which layer ofthe TCP/IP stack promotes the reliable transmission of data?

Options:

A.

Link

B.

Internet

C.

Application

D.

Transport

Question 65

During a post-mortem incident review meeting, it is noted that a malicious attacker attempted to achieve network persistence by using vulnerabilities that appeared to be lower risk but ultimately allowed the attacker to escalate their privileges. Which ofthe following did the attacker MOST likely apply?

Options:

A.

Exploit chaining

B.

Brute force attack

C.

Cross-site scripting

D.

Deployment of rogue wireless access points

Question 66

Which of the following is the PRIMARY reason for tracking the effectiveness of vulnerability remediation processes within an organization?

Options:

A.

To provide reports to senior management so that they can justify the expense of vulnerability management tools

B.

To identify executives who are responsible for delaying patching and report them to the board

C.

To ensure employees responsible for patching vulnerabilities are actually doing their job correctly

D.

To reduce the likelihood of a threat actor successfully exploiting vulnerabilities In the organization's systems

Question 67

Most of the operational responsibility remains with the customerin which of the following cloudservice models?

Options:

A.

Data Platform as a Service (DPaaS)

B.

Software as a Service (SaaS)

C.

Platform as a Service (PaaS)

D.

Infrastructure as a Service (laaS)

Question 68

Exposing the session identifier in a URL is an example of which web application-specific risk?

Options:

A.

Cryptographic failures

B.

Insecure design and implementation

C.

Identification and authentication failures

D.

Broken access control

Question 69

Which of the followingBESTdescribes static application security testing (SAST)?

Options:

A.

Vulnerability scanning

B.

Codereview

C.

Attack simulation

D.

Configuration management

Question 70

A change advisory board Is meeting to review a remediation plan for a critical vulnerability, with a cybersecurity analyst in attendance. When asked about measures to address post-implementation issues, which o! the following would be the analyst's BEST response?

Options:

A.

The remediation should be canceled if post-implementation issues are anticipated.

B.

Details for rolling back applied changes should be included In the remediation plan.

C.

The severity of the vulnerability determines whether a rollback plan is required.

D.

The presence of additional onsite staff during the implementation removes the need for a rollback plan.

Question 71

Which of the following Isa PRIMARY purpose of middleware?

Options:

A.

Enabling communication between different applications

B.

Providing security to applications

C.

Storing data for applications

D.

Creating user interfaces for applications

Question 72

Which of the following would BCST enable an organization to prioritize remediation activities when multiple vulnerabilities are identified?

Options:

A.

Business Impact analysis (BIA)

B.

Vulnerability exception process

C.

executive reporting process

D.

Risk assessment

Page: 1 / 14
Total 139 questions