Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

CCOA ISACA Certified Cybersecurity Operations Analyst Questions and Answers

Questions 4

Multi-factor authentication (MFA) BEST protects against which of the following attack vectors?

Options:

A.

Compromised credentials

B.

Social engineering

C.

Malware

D.

Ransomware

Buy Now
Questions 5

Which of the following is foundational for implementing a Zero Trust model?

Options:

A.

Comprehensive process documentation

B.

Robust network monitoring

C.

Routine vulnerability and penetration testing

D.

Identity and access management (IAM) controls

Buy Now
Questions 6

Which of (he following is the PRIMARY reason to regularly review firewall rules?

Options:

A.

To identify and remove rules that are no longer needed

B.

To identify and allow blocked traffic that should be permitted

C.

To ensure the rules remain in the correct order

D.

To correct mistakes made by other firewall administrators

Buy Now
Questions 7

A nation-state that is employed to cause financial damage on an organization is BEST categorized as:

Options:

A.

a vulnerability.

B.

a risk.

C.

an attach vector.

D.

a threat actor.

Buy Now
Questions 8

A password Is an example of which type of authentication factor?

Options:

A.

Something you do

B.

Something you know

C.

Something you are

D.

Something you have

Buy Now
Questions 9

Which of the following is the GREATEST risk resulting from a Domain Name System (DNS) cache poisoning attack?

Options:

A.

Reduced system availability

B.

Noncompliant operations

C.

Loss of network visibility

D.

Loss of sensitive data

Buy Now
Questions 10

Which of the following is theMOSTimportant component oftheasset decommissioning process from a data risk perspective?

Options:

A.

Informing the data owner when decommissioning is complete

B.

Destruction of data on the assets

C.

Updating the asset status in the configuration management database (CMD8)

D.

Removing the monitoring of the assets

Buy Now
Questions 11

An organization's hosted database environment is encrypted by the vendor at rest and in transit. The database was accessed, and critical data was stolen. Which of the following is the MOST likely cause?

Options:

A.

Use of group rights for access

B.

Improper backup procedures

C.

Misconfigured access control list (ACL)

D.

Insufficiently strong encryption

Buy Now
Questions 12

In which phase of the Cyber Kill Chain" would a red team run a network and port scan with Nmap?

Options:

A.

Exploitation

B.

Delivery

C.

Reconnaissance

D.

Weaponization

Buy Now
Questions 13

As part of a penetration testing program, which team facilitates education and training of architects and developers to encourage better security and awareness?

Options:

A.

Orange team

B.

Red team

C.

Green team

D.

Yellow team

Buy Now
Questions 14

SOAP and REST are Iwo different approaches related to:

Options:

A.

machine learning (ML) design.

B.

cloud-based anomaly detection.

C.

SG/6G networks.

D.

application programming Interface (API) design.

Buy Now
Questions 15

After identified weaknesses have been remediated, which of the following should be completed NEXT?

Options:

A.

Perform a validation scan before moving to production.

B.

Perform software code testing.

C.

Perform a software quality assurance (QA) activity.

D.

Move the fixed system directly to production.

Buy Now
Questions 16

A penetration tester has been hired and given access to all code, diagrams,and documentation. Which type oftesting is being conducted?

Options:

A.

Full knowledge

B.

Unlimited scope

C.

No knowledge

D.

Partial knowledge

Buy Now
Questions 17

Question 1 and 2

You have been provided with authentication logs toinvestigate a potential incident. The file is titledwebserver-auth-logs.txt and located in theInvestigations folder on the Desktop.

Which IP address is performing a brute force attack?

What is the total number of successful authenticationsby the IP address performing the brute force attack?

Options:

Buy Now
Questions 18

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many logs are associated with well knownunencrypted web traffic for the month of December2023 (Absolute)? Note: Security Onion refers to logsas documents.

Options:

Buy Now
Questions 19

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Create a new case in Security Onion from the win-webserver01_logs.zip file. The case title is WindowsWebserver Logs - CCOA New Case and TLP must beset to Green. No additional fields are required.

Options:

Buy Now
Questions 20

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

Use the IOCs to find the compromised host. Enter thehost name identified in the keyword agent.name fieldbelow.

Options:

Buy Now
Questions 21

For this question you must log into GreenboneVulnerability Manager using Firefox. The URL is:https://10.10.55.4:9392 and credentials are:

Username:admin

Password:Secure-gvm!

A colleague performed a vulnerability scan but did notreview prior to leaving for a family emergency. It hasbeen determined that a threat actor is using CVE-2021-22145 in the wild. What is the host IP of the machinethat is vulnerable to this CVE?

Options:

Buy Now
Questions 22

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the C2 host of the attack. Enter your responsebelow.

Options:

Buy Now
Questions 23

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

What is the name of the service that the malware attempts to install?

Options:

Buy Now
Questions 24

Which ruleset can be applied in the

/home/administrator/hids/ruleset/rules directory?

Double-click each image to view it larger.

Options:

Buy Now
Questions 25

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Generate a SHA256 digest of the System-logs.evtx filewithin the win-webserver01_logs.zip file and providethe output below.

Options:

Buy Now
Questions 26

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which host IP was targeted during the following timeframe: 11:39 PM to 11:43 PM (Absolute) on August 16,2024?

Options:

Buy Now
Questions 27

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the name of the file containing the ransomwaredemand? Your response must include the fileextension.

Options:

Buy Now
Questions 28

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many unique IPs have received well knownunencrypted web connections from the beginning of2022 to the end of 2023 (Absolute)?

Options:

Buy Now
Questions 29

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the full User-Agent value associated with theransomware demand file download. Enter your responsein the field below.

Options:

Buy Now
Questions 30

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What date was the webshell accessed? Enter the formatas YYYY-MM-DD.

Options:

Buy Now
Questions 31

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?

Options:

Buy Now
Questions 32

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which of the following domain name(s) from the CCOAThreat Bulletin.pdf was contacted between 12:10 AMto 12:12 AM (Absolute) on August 17, 2024?

Options:

Buy Now
Questions 33

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the contents of the file and save the output in atext file with a filename of pcap_artifact5_decoded.txton the Analyst Desktop.

Options:

Buy Now
Questions 34

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What is the filename of the webshell used to control thehost 10.10.44.200? Your response must include the fileextension.

Options:

Buy Now
Questions 35

In the Open Systems Interconnection (OSI) Model for computer networking, which of the following is the function of the network layer?

Options:

A.

Facilitating communications with applications running on other computers

B.

Transmitting data segments between points on a network

C.

Translating data between a networking service and an application

D.

Structuring and managing a multi-node network

Buy Now
Questions 36

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

Based on the contents of the malscript.viruz.txt, whichthreat actor group is the malware associated with?

Options:

Buy Now
Questions 37

A change advisory board Is meeting to review a remediation plan for a critical vulnerability, with a cybersecurity analyst in attendance. When asked about measures to address post-implementation issues, which o! the following would be the analyst's BEST response?

Options:

A.

The remediation should be canceled if post-implementation issues are anticipated.

B.

Details for rolling back applied changes should be included In the remediation plan.

C.

The severity of the vulnerability determines whether a rollback plan is required.

D.

The presence of additional onsite staff during the implementation removes the need for a rollback plan.

Buy Now
Questions 38

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the targets within the file pcap_artifact5.txt.

Select the correct decoded targets below.

10cal.com/exam

clOud-s3cure.com

c0c0nutf4rms.net

h3avy_s3as.biz

b4ddata.org

Options:

Buy Now
Questions 39

How can port security protect systems on a segmented network?

Options:

A.

By enforcing encryption of data on the network

B.

By preventing unauthorized access to the network

C.

By establishing a Transport Layer Security (TLS) handshake

D.

By requiring multi-factor authentication

Buy Now
Questions 40

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

The following credentials are used for thisquestion.

Username:Accounting

Password:1x-4cc0unt1NG-x1

Using the provided credentials, SSH to the Accountingworkstation and generate a SHA256 checksum of the filethat triggered RuleName Suspicious PowerShell usingeither certutil or Get-FileHash of the file causing theissue. Copy the hash and paste it below.

Options:

Buy Now
Questions 41

Which type of cloud deployment model is intended to be leveraged over the Internet by many organizations with varying needs and requirements?

Options:

A.

Hybrid cloud

B.

Community cloud

C.

Public cloud

D.

Private cloud

Buy Now
Exam Code: CCOA
Exam Name: ISACA Certified Cybersecurity Operations Analyst
Last Update: May 2, 2025
Questions: 139

PDF + Testing Engine

$249

Testing Engine

$225

PDF (Q&A)

$199