Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

CCOA ISACA Certified Cybersecurity Operations Analyst Questions and Answers

Questions 4

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

The following credentials are used for thisquestion.

Username:Accounting

Password:1x-4cc0unt1NG-x1

Using the provided credentials, SSH to the Accountingworkstation and generate a SHA256 checksum of the filethat triggered RuleName Suspicious PowerShell usingeither certutil or Get-FileHash of the file causing theissue. Copy the hash and paste it below.

Options:

Buy Now
Questions 5

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many unique IPs have received well knownunencrypted web connections from the beginning of2022 to the end of 2023 (Absolute)?

Options:

Buy Now
Questions 6

During a post-mortem incident review meeting, it is noted that a malicious attacker attempted to achieve network persistence by using vulnerabilities that appeared to be lower risk but ultimately allowed the attacker to escalate their privileges. Which ofthe following did the attacker MOST likely apply?

Options:

A.

Exploit chaining

B.

Brute force attack

C.

Cross-site scripting

D.

Deployment of rogue wireless access points

Buy Now
Questions 7

When identifying vulnerabilities, which of the following should a cybersecurity analyst determine FIRST?

Options:

A.

The number of vulnerabilities Identifiable by the scanning tool

B.

The numberof tested asset types included in the assessment

C.

The vulnerability categories possible for the tested asset types

D.

The vulnerability categories Identifiable by the scanning tool

Buy Now
Questions 8

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

Perform a query of startup items for the agent.nameaccounting-pc in the SIEM for the last 24 hours. Identifythe file name that triggered RuleName SuspiciousPowerShell. Enter your response below. Your responsemust include the file extension.

Options:

Buy Now
Questions 9

After identified weaknesses have been remediated, which of the following should be completed NEXT?

Options:

A.

Perform a validation scan before moving to production.

B.

Perform software code testing.

C.

Perform a software quality assurance (QA) activity.

D.

Move the fixed system directly to production.

Buy Now
Questions 10

Which ofthe following is a type of middleware used to manage distributed transactions?

Options:

A.

Message-oriented middleware

B.

Transaction processing monitor

C.

Remote procedure call

D.

Object request broker

Buy Now
Questions 11

Which ofthe following is .1 PRIMARY output from the development of a cyber risk management strategy?

Options:

A.

Accepted processes are Identified.

B.

Business goals are communicated.

C.

Compliance implementation is optimized.

D.

Mitigation activities are defined.

Buy Now
Questions 12

A bank employee is found to beexfiltrationsensitive information by uploading it via email. Which of the following security measures would be MOST effective in detecting this type of insider threat?

Options:

A.

Data loss prevention (DIP)

B.

Intrusion detection system (IDS)

C.

Network segmentation

D.

Security information and event management (SIEM)

Buy Now
Questions 13

An insecure continuous integration and continuous delivery (CI/CD) pipeline would MOST likely lead to:

Options:

A.

software Integrity failures.

B.

broken access control.

C.

security monitoring failures.

D.

browser compatibility Issues.

Buy Now
Questions 14

Which of the following roles typically performs routine vulnerability scans?

Options:

A.

Incident response manager

B.

Information security manager

C.

IT auditor

D.

IT security specialist

Buy Now
Questions 15

Which of the following should be completedFIRSTin a data loss prevention (OLP) system implementation project?

Options:

A.

Deployment scheduling

B.

Data analysis

C.

Data Inventory

D.

Resource allocation

Buy Now
Questions 16

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Create a new case in Security Onion from the win-webserver01_logs.zip file. The case title is WindowsWebserver Logs - CCOA New Case and TLP must beset to Green. No additional fields are required.

Options:

Buy Now
Questions 17

Which of the following Is a PRIMARY function of a network intrusion detection system (IDS)?

Options:

A.

Dropping network traffic if suspicious packets are detected

B.

Analyzing whether packets are suspicious

C.

Filtering incoming and outgoing network traffic based on security policies

D.

Preventing suspicious packets from being executed

Buy Now
Questions 18

Which of the following is the PRIMARY risk associated with cybercriminals eavesdropping on unencrypted network traffic?

Options:

A.

Data notification

B.

Data exfiltration

C.

Data exposure

D.

Data deletion

Buy Now
Questions 19

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which of the following domain name(s) from the CCOAThreat Bulletin.pdf was contacted between 12:10 AMto 12:12 AM (Absolute) on August 17, 2024?

Options:

Buy Now
Questions 20

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the contents of the file and save the output in atext file with a filename of pcap_artifact5_decoded.txton the Analyst Desktop.

Options:

Buy Now
Questions 21

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many logs are associated with well knownunencrypted web traffic for the month of December2023 (Absolute)? Note: Security Onion refers to logsas documents.

Options:

Buy Now
Questions 22

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

What is the name of the suspected malicious filecaptured by keyword process.executable at 11:04 PM?

Options:

Buy Now
Questions 23

An organization was breached via a web application attack to a database in which user inputs were not validated. This can BEST be described as which type of attack?

Options:

A.

Broken access control

B.

Infection

C.

Buffer overflow

D.

X-Path

Buy Now
Questions 24

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which host IP was targeted during the following timeframe: 11:39 PM to 11:43 PM (Absolute) on August 16,2024?

Options:

Buy Now
Questions 25

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the C2 host of the attack. Enter your responsebelow.

Options:

Buy Now
Questions 26

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

Based on the contents of the malscript.viruz.txt, whichthreat actor group is the malware associated with?

Options:

Buy Now
Questions 27

Which of the following is MOST important for maintaining an effective risk management program?

Options:

A.

Approved budget

B.

Automated reporting

C.

Monitoring regulations

D.

Ongoing review

Buy Now
Questions 28

Robust background checks provide protection against:

Options:

A.

distributed dental of service (DDoS) attacks.

B.

insider threats.

C.

phishing.

D.

ransomware.

Buy Now
Questions 29

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the targets within the file pcap_artifact5.txt.

Select the correct decoded targets below.

10cal.com/exam

clOud-s3cure.com

c0c0nutf4rms.net

h3avy_s3as.biz

b4ddata.org

Options:

Buy Now
Questions 30

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?

Options:

Buy Now
Questions 31

Which of the following network topologies is MOST resilient to network failures and can prevent a single point of failure?

Options:

A.

Mesh

B.

Star

C.

Bus

D.

Ring

Buy Now
Questions 32

Question 1 and 2

You have been provided with authentication logs toinvestigate a potential incident. The file is titledwebserver-auth-logs.txt and located in theInvestigations folder on the Desktop.

Which IP address is performing a brute force attack?

What is the total number of successful authenticationsby the IP address performing the brute force attack?

Options:

Buy Now
Questions 33

Cyber Analyst Password:

For questions that require use of the SIEM, pleasereference the information below:

https://10.10.55.2

Security-Analyst!

CYB3R-4n4ly$t!

Email Address:

ccoatest@isaca.org

Password:Security-Analyst!

The enterprise has been receiving a large amount offalse positive alerts for the eternalblue vulnerability. TheSIEM rulesets are located in

/home/administrator/hids/ruleset/rules.

What is the name of the file containing the ruleset foreternalblue connections? Your response must includethe file extension.

Options:

Buy Now
Questions 34

Exposing the session identifier in a URL is an example of which web application-specific risk?

Options:

A.

Cryptographic failures

B.

Insecure design and implementation

C.

Identification and authentication failures

D.

Broken access control

Buy Now
Questions 35

An organization has received complaints from a number of its customers that their data has been breached. However, after an investigation, the organization cannot detect any indicators of compromise. The breach was MOST likely due to which type of attack?

Options:

A.

Supply chain attack

B.

Zero-day attack

C.

injection attack

D.

Man-in the-middle attack

Buy Now
Questions 36

An organization's financial data was compromised and posted online. The forensics review confirms proper access rights and encryption of the database at the host site. A lack of which of the following controls MOST likely caused the exposure?

Options:

A.

Continual backups

B.

Multi-factor authentication (MFA)

C.

Encryption o' data in transit

D.

Properly configured firewall

Buy Now
Questions 37

A small organization has identified a potential risk associated with its outdated backup system and has decided to implement a new cloud-based real-time backup system to reduce the likelihood of data loss. Which of the following risk responses has the organization chosen?

Options:

A.

Risk mitigation

B.

Risk avoidance

C.

Risk transfer

D.

Risk acceptance

Buy Now
Questions 38

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

Use the IOCs to find the compromised host. Enter thehost name identified in the keyword agent.name fieldbelow.

Options:

Buy Now
Questions 39

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

What is the name of the service that the malware attempts to install?

Options:

Buy Now
Questions 40

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the full User-Agent value associated with theransomware demand file download. Enter your responsein the field below.

Options:

Buy Now
Questions 41

For this question you must log into GreenboneVulnerability Manager using Firefox. The URL is:https://10.10.55.4:9392 and credentials are:

Username:admin

Password:Secure-gvm!

A colleague performed a vulnerability scan but did notreview prior to leaving for a family emergency. It hasbeen determined that a threat actor is using CVE-2021-22145 in the wild. What is the host IP of the machinethat is vulnerable to this CVE?

Options:

Buy Now
Exam Code: CCOA
Exam Name: ISACA Certified Cybersecurity Operations Analyst
Last Update: Apr 30, 2025
Questions: 139
CCOA pdf

CCOA PDF

$59.7  $199
CCOA Engine

CCOA Testing Engine

$67.5  $225
CCOA PDF + Engine

CCOA PDF + Testing Engine

$74.7  $249