Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Isaca CCOA Dumps Questions Answers

Page: 1 / 10
Total 139 questions

ISACA Certified Cybersecurity Operations Analyst Questions and Answers

Question 1

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?

Options:

Buy Now
Question 2

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which of the following domain name(s) from the CCOAThreat Bulletin.pdf was contacted between 12:10 AMto 12:12 AM (Absolute) on August 17, 2024?

Options:

Question 3

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the C2 host of the attack. Enter your responsebelow.

Options:

Question 4

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many unique IPs have received well knownunencrypted web connections from the beginning of2022 to the end of 2023 (Absolute)?

Options:

Question 5

Which ruleset can be applied in the

/home/administrator/hids/ruleset/rules directory?

Double-click each image to view it larger.

Options:

Question 6

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which host IP was targeted during the following timeframe: 11:39 PM to 11:43 PM (Absolute) on August 16,2024?

Options:

Question 7

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

Perform a query of startup items for the agent.nameaccounting-pc in the SIEM for the last 24 hours. Identifythe file name that triggered RuleName SuspiciousPowerShell. Enter your response below. Your responsemust include the file extension.

Options:

Question 8

For this question you must log into GreenboneVulnerability Manager using Firefox. The URL is: and credentials are:

Username:admin

Password:Secure-gvm!

A colleague performed a vulnerability scan but did notreview prior to leaving for a family emergency. It hasbeen determined that a threat actor is using CVE-2021-22145 in the wild. What is the host IP of the machinethat is vulnerable to this CVE?

Options:

Question 9

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What date was the webshell accessed? Enter the formatas YYYY-MM-DD.

Options:

Question 10

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the full User-Agent value associated with theransomware demand file download. Enter your responsein the field below.

Options:

Question 11

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

Based on the contents of the malscript.viruz.txt, whichthreat actor group is the malware associated with?

Options:

Question 12

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Generate a SHA256 digest of the System-logs.evtx filewithin the win-webserver01_logs.zip file and providethe output below.

Options:

Question 13

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the contents of the file and save the output in atext file with a filename of pcap_artifact5_decoded.txton the Analyst Desktop.

Options:

Question 14

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

Use the IOCs to find the compromised host. Enter thehost name identified in the keyword agent.name fieldbelow.

Options:

Question 15

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

What is the name of the suspected malicious filecaptured by keyword process.executable at 11:04 PM?

Options:

Question 16

Question 1 and 2

You have been provided with authentication logs toinvestigate a potential incident. The file is titledwebserver-auth-logs.txt and located in theInvestigations folder on the Desktop.

Which IP address is performing a brute force attack?

What is the total number of successful authenticationsby the IP address performing the brute force attack?

Options:

Question 17

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What is the filename of the webshell used to control thehost 10.10.44.200? Your response must include the fileextension.

Options:

Question 18

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Create a new case in Security Onion from the win-webserver01_logs.zip file. The case title is WindowsWebserver Logs - CCOA New Case and TLP must beset to Green. No additional fields are required.

Options:

Question 19

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many logs are associated with well knownunencrypted web traffic for the month of December2023 (Absolute)? Note: Security Onion refers to logsas documents.

Options:

Question 20

Cyber Analyst Password:

For questions that require use of the SIEM, pleasereference the information below:

Security-Analyst!

CYB3R-4n4ly$t!

Email Address:

ccoatest@isaca.org

Password:Security-Analyst!

The enterprise has been receiving a large amount offalse positive alerts for the eternalblue vulnerability. TheSIEM rulesets are located in

/home/administrator/hids/ruleset/rules.

What is the name of the file containing the ruleset foreternalblue connections? Your response must includethe file extension.

Options:

Question 21

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the targets within the file pcap_artifact5.txt.

Select the correct decoded targets below.

10cal.com/exam

clOud-s3cure.com

c0c0nutf4rms.net

h3avy_s3as.biz

b4ddata.org

Options:

Question 22

Which of the following would BCST enable an organization to prioritize remediation activities when multiple vulnerabilities are identified?

Options:

A.

Business Impact analysis (BIA)

B.

Vulnerability exception process

C.

executive reporting process

D.

Risk assessment

Question 23

Which of the following roles typically performs routine vulnerability scans?

Options:

A.

Incident response manager

B.

Information security manager

C.

IT auditor

D.

IT security specialist

Question 24

Which of the following roles is responsible for approving exceptions to and deviations from the incident management team charter on an ongoing basis?

Options:

A.

Security steering group

B.

Cybersecurity analyst

C.

Chief information security officer (CISO)

D.

Incident response manager

Question 25

Which of the following cyber crime tactics involves targets being contacted via text message by an attacker posing as a legitimate entity?

Options:

A.

Hacking

B.

Vishing

C.

Smishing

D.

Cyberstalking

Question 26

Which of the following is the MOST effective approach for tracking vulnerabilities in an organization's systems and applications?

Options:

A.

Walt for external security researchers to report vulnerabilities

B.

Rely on employees to report any vulnerabilities they encounter.

C.

Implement regular vulnerability scanning and assessments.

D.

Track only those vulnerabilities that have been publicly disclosed.

Question 27

Which of the following is the PRIMARY purpose for an organization to adopt a cybersecurityframework?

Options:

A.

To ensure compliance with specific regulations

B.

To automate cybersecurity processes and reduce the need for human intervention

C.

To provide a standardized approach to cybetsecurity risk management

D.

To guarantee protection against possible cyber threats

Question 28

Which ofthe following is the PRIMARY purpose of load balancers in cloud networking?

Options:

A.

Distributing traffic between multiple servers

B.

Optimizing database queries

C.

Monitoring network traffic

D.

Load testing applications

Question 29

Which of the following is MOST important for maintaining an effective risk management program?

Options:

A.

Approved budget

B.

Automated reporting

C.

Monitoring regulations

D.

Ongoing review

Question 30

Which of the following security practices is MOST effective in reducing system risk through system hardening?

Options:

A.

Having more than one user to complete a task

B.

Permitting only the required access

C.

Giving users only the permissions they need

D.

Enabling only the required capabilities

Question 31

What is the GREATEST security concern associated with virtual (nation technology?

Options:

A.

Inadequate resource allocation

B.

Insufficient isolation between virtual machines (VMs)

C.

Shared network access

D.

Missing patch management for the technology

Question 32

An organization uses containerization for its business application deployments, and all containers run on the same host, so they MUST share the same:

Options:

A.

user data.

B.

database.

C.

operating system.

D.

application.

Question 33

Which type of cloud deployment model is intended to be leveraged over the Internet by many organizations with varying needs and requirements?

Options:

A.

Hybrid cloud

B.

Community cloud

C.

Public cloud

D.

Private cloud

Question 34

An attacker has exploited an e-commerce website by injecting arbitrary syntax that was passed to and executed by the underlying operating system. Which of the following tactics did the attacker MOST likely use?

Options:

A.

Command injection

B.

Injection

C.

Lightweight Directory Access Protocol (LDAP) Injection

D.

Insecure direct object reference

Question 35

Which of the following processes is MOST effective for reducing application risk?

Options:

A.

Regular third-party risk assessments

B.

Regular code reviews throughout development

C.

Regular vulnerability scans after deployment

D.

Regular monitoring of application use

Question 36

Which of the following is MOST likely to result from misunderstanding the cloud service shared responsibility model?

Options:

A.

Falsely assuming that certain risks have been transferred to the vendor

B.

Improperly securing access to the cloud metastructure layer

C.

Misconfiguration of access controls for cloud services

D.

Being forced to remain with the cloud service provider due to vendor lock-In

Question 37

Which of the following is MOST likely to result from a poorly enforced bring your own device (8YOD) policy?

Options:

A.

Weak passwords

B.

Network congestion

C.

Shadow IT

D.

Unapproved social media posts

Question 38

Which of the following BEST enables an organization to identify potential security threats by monitoring and analyzing network traffic for unusual activity?

Options:

A.

Web application firewall (WAP)

B.

Endpoint security

C.

Security operation center (SOC)

D.

Data loss prevention (DLP)

Question 39

An organization moving its payment card system into a separate location on its network (or security reasons is an example of network:

Options:

A.

redundancy.

B.

segmentation.

C.

encryption.

D.

centricity.

Question 40

Which of the following is a security feature provided by the WS-Security extension in the Simple Object Access Protocol (SOAP)?

Options:

A.

Transport Layer Security (TLS)

B.

Message confidentiality

C.

MaIware protection

D.

Session management

Question 41

Which of the following is the PRIMARY security related reason to use a tree network topology rather than a bus network topology?

Options:

A.

It enables easier network expansion and scalability.

B.

It enables better network performance and bandwidth utilization.

C.

It is more resilient and stable to network failures.

D.

It Is less susceptible to data Interception and eavesdropping.

Page: 1 / 10
Total 139 questions