Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CCOA ISACA Certified Cybersecurity Operations Analyst Questions and Answers

Questions 4

Which types of network devices are MOST vulnerable due to age and complexity?

Options:

A.

Ethernet

B.

Mainframe technology

C.

Operational technology

D.

Wireless

Buy Now
Questions 5

Robust background checks provide protection against:

Options:

A.

distributed dental of service (DDoS) attacks.

B.

insider threats.

C.

phishing.

D.

ransomware.

Buy Now
Questions 6

Which of the following is the core component of an operating system that manages resources, implements security policies, and provides the interface between hardware and software?

Options:

A.

Kernel

B.

Library

C.

Application

D.

Shell

Buy Now
Questions 7

What is the GREATEST security concern associated with virtual (nation technology?

Options:

A.

Inadequate resource allocation

B.

Insufficient isolation between virtual machines (VMs)

C.

Shared network access

D.

Missing patch management for the technology

Buy Now
Questions 8

A penetration tester has been hired and given access to all code, diagrams,and documentation. Which type oftesting is being conducted?

Options:

A.

Full knowledge

B.

Unlimited scope

C.

No knowledge

D.

Partial knowledge

Buy Now
Questions 9

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the contents of the file and save the output in atext file with a filename of pcap_artifact5_decoded.txton the Analyst Desktop.

Options:

Buy Now
Questions 10

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?

Options:

Buy Now
Questions 11

Which of the following is a security feature provided by the WS-Security extension in the Simple Object Access Protocol (SOAP)?

Options:

A.

Transport Layer Security (TLS)

B.

Message confidentiality

C.

MaIware protection

D.

Session management

Buy Now
Questions 12

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the C2 host of the attack. Enter your responsebelow.

Options:

Buy Now
Questions 13

Which of the following is the BEST method for hardening an operating system?

Options:

A.

Implementing a host Intrusion detection system (HIOS)

B.

Manually signing all drivers and applications

C.

Removing unnecessary services and applications

D.

Applying only critical updates

Buy Now
Questions 14

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many logs are associated with well knownunencrypted web traffic for the month of December2023 (Absolute)? Note: Security Onion refers to logsas documents.

Options:

Buy Now
Questions 15

Which of the following security practices is MOST effective in reducing system risk through system hardening?

Options:

A.

Having more than one user to complete a task

B.

Permitting only the required access

C.

Giving users only the permissions they need

D.

Enabling only the required capabilities

Buy Now
Questions 16

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

What is the name of the service that the malware attempts to install?

Options:

Buy Now
Questions 17

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What is the filename of the webshell used to control thehost 10.10.44.200? Your response must include the fileextension.

Options:

Buy Now
Questions 18

Before performing a penetration test for a client, it is MOST crucial to ensure:

Options:

A.

authorized consent is obtained.

B.

the timeframe has been determined.

C.

scope is defined.

D.

price has been estimated.

Buy Now
Questions 19

In which phase of the Cyber Kill Chain" would a red team run a network and port scan with Nmap?

Options:

A.

Exploitation

B.

Delivery

C.

Reconnaissance

D.

Weaponization

Buy Now
Questions 20

Which type of security model leverages the use of data science and machine learning (ML) to further enhance threat intelligence?

Options:

A.

Brew-Nash model

B.

Bell-LaPadula confidentiality model

C.

Security-ln-depth model

D.

Layered security model

Buy Now
Questions 21

Which of the following cyber crime tactics involves targets being contacted via text message by an attacker posing as a legitimate entity?

Options:

A.

Hacking

B.

Vishing

C.

Smishing

D.

Cyberstalking

Buy Now
Questions 22

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

Use the IOCs to find the compromised host. Enter thehost name identified in the keyword agent.name fieldbelow.

Options:

Buy Now
Questions 23

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Generate a SHA256 digest of the System-logs.evtx filewithin the win-webserver01_logs.zip file and providethe output below.

Options:

Buy Now
Questions 24

Which of the following is the PRIMARY benefit of implementing logical access controls on a need-to-know basis?

Options:

A.

Limiting access to sensitive data and resources

B.

Ensuring users can access all resources on the network

C.

Providing a consistent user experience across different applications

D.

Reducing the complexity of access control policies and procedures

Buy Now
Questions 25

Which of the following is the PRIMARY benefit of using software-defined networking for network security?

Options:

A.

It simplifies network topology and reduces complexity.

B.

It provides greater scalability and flexibility for network devices.

C.

It allows for centralized security management and control.

D.

It Improves security monitoring and alerting capabilities.

Buy Now
Questions 26

Which of the following should be considered FIRST when determining how to protect an organization's information assets?

Options:

A.

A prioritized Inventory of IT assets

B.

The organization's business model

C.

Results of vulnerability assessments

D.

The organization's risk reporting

Buy Now
Questions 27

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the full User-Agent value associated with theransomware demand file download. Enter your responsein the field below.

Options:

Buy Now
Questions 28

Which of the following is the MOST common output of a vulnerability assessment?

Options:

A.

A list of identified vulnerabilities along with a severity level for each

B.

A detailed report on the overall vulnerability posture, including physical security measures

C.

A list of potential attackers along with their IP addresses and geolocation data

D.

A list of authorized users and their access levels for each system and application

Buy Now
Questions 29

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

Perform a query of startup items for the agent.nameaccounting-pc in the SIEM for the last 24 hours. Identifythe file name that triggered RuleName SuspiciousPowerShell. Enter your response below. Your responsemust include the file extension.

Options:

Buy Now
Questions 30

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

Based on the contents of the malscript.viruz.txt, whichthreat actor group is the malware associated with?

Options:

Buy Now
Questions 31

For this question you must log into GreenboneVulnerability Manager using Firefox. The URL is:https://10.10.55.4:9392 and credentials are:

Username:admin

Password:Secure-gvm!

A colleague performed a vulnerability scan but did notreview prior to leaving for a family emergency. It hasbeen determined that a threat actor is using CVE-2021-22145 in the wild. What is the host IP of the machinethat is vulnerable to this CVE?

Options:

Buy Now
Questions 32

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which of the following domain name(s) from the CCOAThreat Bulletin.pdf was contacted between 12:10 AMto 12:12 AM (Absolute) on August 17, 2024?

Options:

Buy Now
Questions 33

Cyber Analyst Password:

For questions that require use of the SIEM, pleasereference the information below:

https://10.10.55.2

Security-Analyst!

CYB3R-4n4ly$t!

Email Address:

ccoatest@isaca.org

Password:Security-Analyst!

The enterprise has been receiving a large amount offalse positive alerts for the eternalblue vulnerability. TheSIEM rulesets are located in

/home/administrator/hids/ruleset/rules.

What is the name of the file containing the ruleset foreternalblue connections? Your response must includethe file extension.

Options:

Buy Now
Questions 34

Cyber threat intelligence is MOST important for:

Options:

A.

performing root cause analysis for cyber attacks.

B.

configuring SIEM systems and endpoints.

C.

recommending best practices for database security.

D.

revealing adversarial tactics, techniques, and procedures.

Buy Now
Questions 35

A bank employee is found to beexfiltrationsensitive information by uploading it via email. Which of the following security measures would be MOST effective in detecting this type of insider threat?

Options:

A.

Data loss prevention (DIP)

B.

Intrusion detection system (IDS)

C.

Network segmentation

D.

Security information and event management (SIEM)

Buy Now
Questions 36

Which of the following is the MOST effective approach for tracking vulnerabilities in an organization's systems and applications?

Options:

A.

Walt for external security researchers to report vulnerabilities

B.

Rely on employees to report any vulnerabilities they encounter.

C.

Implement regular vulnerability scanning and assessments.

D.

Track only those vulnerabilities that have been publicly disclosed.

Buy Now
Questions 37

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What date was the webshell accessed? Enter the formatas YYYY-MM-DD.

Options:

Buy Now
Questions 38

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

The following credentials are used for thisquestion.

Username:Accounting

Password:1x-4cc0unt1NG-x1

Using the provided credentials, SSH to the Accountingworkstation and generate a SHA256 checksum of the filethat triggered RuleName Suspicious PowerShell usingeither certutil or Get-FileHash of the file causing theissue. Copy the hash and paste it below.

Options:

Buy Now
Questions 39

Which ruleset can be applied in the

/home/administrator/hids/ruleset/rules directory?

Double-click each image to view it larger.

Options:

Buy Now
Questions 40

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many unique IPs have received well knownunencrypted web connections from the beginning of2022 to the end of 2023 (Absolute)?

Options:

Buy Now
Questions 41

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

What is the name of the suspected malicious filecaptured by keyword process.executable at 11:04 PM?

Options:

Buy Now
Exam Code: CCOA
Exam Name: ISACA Certified Cybersecurity Operations Analyst
Last Update: Apr 30, 2025
Questions: 139
CCOA pdf

CCOA PDF

$59.7  $199
CCOA Engine

CCOA Testing Engine

$67.5  $225
CCOA PDF + Engine

CCOA PDF + Testing Engine

$74.7  $249