Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CCOA ISACA Certified Cybersecurity Operations Analyst Questions and Answers

Questions 4

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the full User-Agent value associated with theransomware demand file download. Enter your responsein the field below.

Options:

Buy Now
Questions 5

For this question you must log into GreenboneVulnerability Manager using Firefox. The URL is:https://10.10.55.4:9392 and credentials are:

Username:admin

Password:Secure-gvm!

A colleague performed a vulnerability scan but did notreview prior to leaving for a family emergency. It hasbeen determined that a threat actor is using CVE-2021-22145 in the wild. What is the host IP of the machinethat is vulnerable to this CVE?

Options:

Buy Now
Questions 6

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which of the following domain name(s) from the CCOAThreat Bulletin.pdf was contacted between 12:10 AMto 12:12 AM (Absolute) on August 17, 2024?

Options:

Buy Now
Questions 7

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the C2 host of the attack. Enter your responsebelow.

Options:

Buy Now
Questions 8

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

Perform a query of startup items for the agent.nameaccounting-pc in the SIEM for the last 24 hours. Identifythe file name that triggered RuleName SuspiciousPowerShell. Enter your response below. Your responsemust include the file extension.

Options:

Buy Now
Questions 9

Which type of security model leverages the use of data science and machine learning (ML) to further enhance threat intelligence?

Options:

A.

Brew-Nash model

B.

Bell-LaPadula confidentiality model

C.

Security-ln-depth model

D.

Layered security model

Buy Now
Questions 10

Which of the following should be completedFIRSTin a data loss prevention (OLP) system implementation project?

Options:

A.

Deployment scheduling

B.

Data analysis

C.

Data Inventory

D.

Resource allocation

Buy Now
Questions 11

Which of the following is the PRIMARY purpose for an organization to adopt a cybersecurityframework?

Options:

A.

To ensure compliance with specific regulations

B.

To automate cybersecurity processes and reduce the need for human intervention

C.

To provide a standardized approach to cybetsecurity risk management

D.

To guarantee protection against possible cyber threats

Buy Now
Questions 12

Which of the following has been defined when a disaster recovery plan (DRP) requires daily backups?

Options:

A.

Maximum tolerable downtime (MTD)

B.

Recovery time objective (RTO|

C.

Recovery point objective {RPO)

D.

Mean time to failure (MTTF)

Buy Now
Questions 13

Which of the following is MOST likely to result from a poorly enforced bring your own device (8YOD) policy?

Options:

A.

Weak passwords

B.

Network congestion

C.

Shadow IT

D.

Unapproved social media posts

Buy Now
Questions 14

Which of the following Is the MOST effective way to ensure an organization's management of supply chain risk remains consistent?

Options:

A.

Regularly seeking feedback from the procurement team regarding supplier responsiveness

B.

Periodically confirming suppliers' contractual obligations are met

C.

Periodically counting the number of incident tickets associated with supplier services

D.

Regularly meeting with suppliers to informally discuss Issues

Buy Now
Questions 15

Which of the following is the BEST method for hardening an operating system?

Options:

A.

Implementing a host Intrusion detection system (HIOS)

B.

Manually signing all drivers and applications

C.

Removing unnecessary services and applications

D.

Applying only critical updates

Buy Now
Questions 16

Which of the following is the MOST effective approach for tracking vulnerabilities in an organization's systems and applications?

Options:

A.

Walt for external security researchers to report vulnerabilities

B.

Rely on employees to report any vulnerabilities they encounter.

C.

Implement regular vulnerability scanning and assessments.

D.

Track only those vulnerabilities that have been publicly disclosed.

Buy Now
Questions 17

Which of the following is MOST important for maintaining an effective risk management program?

Options:

A.

Approved budget

B.

Automated reporting

C.

Monitoring regulations

D.

Ongoing review

Buy Now
Questions 18

An organization moving its payment card system into a separate location on its network (or security reasons is an example of network:

Options:

A.

redundancy.

B.

segmentation.

C.

encryption.

D.

centricity.

Buy Now
Questions 19

Cyber threat intelligence is MOST important for:

Options:

A.

performing root cause analysis for cyber attacks.

B.

configuring SIEM systems and endpoints.

C.

recommending best practices for database security.

D.

revealing adversarial tactics, techniques, and procedures.

Buy Now
Questions 20

Which of the following BEST describes JSON web tokens?

Options:

A.

They can be used to store user Information and session data.

B.

They can only be used to authenticate users in web applications.

C.

They are signed using a public key and verified using a private key.

D.

They are only used with symmetric encryption.

Buy Now
Questions 21

Which of the following is a technique for detecting anomalous network behavior that evolves using large data sets and algorithms?

Options:

A.

Machine learning-based analysis

B.

Statistical analysis

C.

Rule-based analysis

D.

Signature-based analysis

Buy Now
Questions 22

Which of the following cyber crime tactics involves targets being contacted via text message by an attacker posing as a legitimate entity?

Options:

A.

Hacking

B.

Vishing

C.

Smishing

D.

Cyberstalking

Buy Now
Questions 23

An insecure continuous integration and continuous delivery (CI/CD) pipeline would MOST likely lead to:

Options:

A.

software Integrity failures.

B.

broken access control.

C.

security monitoring failures.

D.

browser compatibility Issues.

Buy Now
Questions 24

Which ofthe following is the PRIMARY purpose of load balancers in cloud networking?

Options:

A.

Distributing traffic between multiple servers

B.

Optimizing database queries

C.

Monitoring network traffic

D.

Load testing applications

Buy Now
Questions 25

Which layer ofthe TCP/IP stack promotes the reliable transmission of data?

Options:

A.

Link

B.

Internet

C.

Application

D.

Transport

Buy Now
Questions 26

A nation-state that is employed to cause financial damage on an organization is BEST categorized as:

Options:

A.

a vulnerability.

B.

a risk.

C.

an attach vector.

D.

a threat actor.

Buy Now
Questions 27

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many logs are associated with well knownunencrypted web traffic for the month of December2023 (Absolute)? Note: Security Onion refers to logsas documents.

Options:

Buy Now
Questions 28

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Generate a SHA256 digest of the System-logs.evtx filewithin the win-webserver01_logs.zip file and providethe output below.

Options:

Buy Now
Questions 29

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many unique IPs have received well knownunencrypted web connections from the beginning of2022 to the end of 2023 (Absolute)?

Options:

Buy Now
Questions 30

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

What is the name of the suspected malicious filecaptured by keyword process.executable at 11:04 PM?

Options:

Buy Now
Questions 31

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which host IP was targeted during the following timeframe: 11:39 PM to 11:43 PM (Absolute) on August 16,2024?

Options:

Buy Now
Questions 32

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What date was the webshell accessed? Enter the formatas YYYY-MM-DD.

Options:

Buy Now
Questions 33

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the targets within the file pcap_artifact5.txt.

Select the correct decoded targets below.

10cal.com/exam

clOud-s3cure.com

c0c0nutf4rms.net

h3avy_s3as.biz

b4ddata.org

Options:

Buy Now
Questions 34

Cyber Analyst Password:

For questions that require use of the SIEM, pleasereference the information below:

https://10.10.55.2

Security-Analyst!

CYB3R-4n4ly$t!

Email Address:

ccoatest@isaca.org

Password:Security-Analyst!

The enterprise has been receiving a large amount offalse positive alerts for the eternalblue vulnerability. TheSIEM rulesets are located in

/home/administrator/hids/ruleset/rules.

What is the name of the file containing the ruleset foreternalblue connections? Your response must includethe file extension.

Options:

Buy Now
Questions 35

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the name of the file containing the ransomwaredemand? Your response must include the fileextension.

Options:

Buy Now
Questions 36

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?

Options:

Buy Now
Questions 37

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

What is the name of the service that the malware attempts to install?

Options:

Buy Now
Questions 38

Which ruleset can be applied in the

/home/administrator/hids/ruleset/rules directory?

Double-click each image to view it larger.

Options:

Buy Now
Questions 39

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

Use the IOCs to find the compromised host. Enter thehost name identified in the keyword agent.name fieldbelow.

Options:

Buy Now
Questions 40

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

The following credentials are used for thisquestion.

Username:Accounting

Password:1x-4cc0unt1NG-x1

Using the provided credentials, SSH to the Accountingworkstation and generate a SHA256 checksum of the filethat triggered RuleName Suspicious PowerShell usingeither certutil or Get-FileHash of the file causing theissue. Copy the hash and paste it below.

Options:

Buy Now
Questions 41

Before performing a penetration test for a client, it is MOST crucial to ensure:

Options:

A.

authorized consent is obtained.

B.

the timeframe has been determined.

C.

scope is defined.

D.

price has been estimated.

Buy Now
Exam Code: CCOA
Exam Name: ISACA Certified Cybersecurity Operations Analyst
Last Update: Apr 21, 2025
Questions: 139
CCOA pdf

CCOA PDF

$59.7  $199
CCOA Engine

CCOA Testing Engine

$67.5  $225
CCOA PDF + Engine

CCOA PDF + Testing Engine

$74.7  $249