Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Isaca CCOA ISACA Certified Cybersecurity Operations Analyst Exam Practice Test

Demo: 41 questions
Total 139 questions

ISACA Certified Cybersecurity Operations Analyst Questions and Answers

Question 1

Cyber Analyst Password:

For questions that require use of the SIEM, pleasereference the information below:

https://10.10.55.2

Security-Analyst!

CYB3R-4n4ly$t!

Email Address:

ccoatest@isaca.org

Password:Security-Analyst!

The enterprise has been receiving a large amount offalse positive alerts for the eternalblue vulnerability. TheSIEM rulesets are located in

/home/administrator/hids/ruleset/rules.

What is the name of the file containing the ruleset foreternalblue connections? Your response must includethe file extension.

Options:

Question 2

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many logs are associated with well knownunencrypted web traffic for the month of December2023 (Absolute)? Note: Security Onion refers to logsas documents.

Options:

Question 3

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the targets within the file pcap_artifact5.txt.

Select the correct decoded targets below.

10cal.com/exam

clOud-s3cure.com

c0c0nutf4rms.net

h3avy_s3as.biz

b4ddata.org

Options:

Question 4

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What is the filename of the webshell used to control thehost 10.10.44.200? Your response must include the fileextension.

Options:

Question 5

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

The following credentials are used for thisquestion.

Username:Accounting

Password:1x-4cc0unt1NG-x1

Using the provided credentials, SSH to the Accountingworkstation and generate a SHA256 checksum of the filethat triggered RuleName Suspicious PowerShell usingeither certutil or Get-FileHash of the file causing theissue. Copy the hash and paste it below.

Options:

Question 6

For this question you must log into GreenboneVulnerability Manager using Firefox. The URL is:https://10.10.55.4:9392 and credentials are:

Username:admin

Password:Secure-gvm!

A colleague performed a vulnerability scan but did notreview prior to leaving for a family emergency. It hasbeen determined that a threat actor is using CVE-2021-22145 in the wild. What is the host IP of the machinethat is vulnerable to this CVE?

Options:

Question 7

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the name of the file containing the ransomwaredemand? Your response must include the fileextension.

Options:

Question 8

Question 1 and 2

You have been provided with authentication logs toinvestigate a potential incident. The file is titledwebserver-auth-logs.txt and located in theInvestigations folder on the Desktop.

Which IP address is performing a brute force attack?

What is the total number of successful authenticationsby the IP address performing the brute force attack?

Options:

Question 9

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which of the following domain name(s) from the CCOAThreat Bulletin.pdf was contacted between 12:10 AMto 12:12 AM (Absolute) on August 17, 2024?

Options:

Question 10

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which host IP was targeted during the following timeframe: 11:39 PM to 11:43 PM (Absolute) on August 16,2024?

Options:

Question 11

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the full User-Agent value associated with theransomware demand file download. Enter your responsein the field below.

Options:

Question 12

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

Perform a query of startup items for the agent.nameaccounting-pc in the SIEM for the last 24 hours. Identifythe file name that triggered RuleName SuspiciousPowerShell. Enter your response below. Your responsemust include the file extension.

Options:

Question 13

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Create a new case in Security Onion from the win-webserver01_logs.zip file. The case title is WindowsWebserver Logs - CCOA New Case and TLP must beset to Green. No additional fields are required.

Options:

Question 14

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?

Options:

Question 15

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

What is the name of the suspected malicious filecaptured by keyword process.executable at 11:04 PM?

Options:

Question 16

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the contents of the file and save the output in atext file with a filename of pcap_artifact5_decoded.txton the Analyst Desktop.

Options:

Question 17

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the C2 host of the attack. Enter your responsebelow.

Options:

Question 18

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What date was the webshell accessed? Enter the formatas YYYY-MM-DD.

Options:

Question 19

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Generate a SHA256 digest of the System-logs.evtx filewithin the win-webserver01_logs.zip file and providethe output below.

Options:

Question 20

Which ruleset can be applied in the

/home/administrator/hids/ruleset/rules directory?

Double-click each image to view it larger.

Options:

Question 21

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

Based on the contents of the malscript.viruz.txt, whichthreat actor group is the malware associated with?

Options:

Question 22

Which of the following roles is responsible for approving exceptions to and deviations from the incident management team charter on an ongoing basis?

Options:

A.

Security steering group

B.

Cybersecurity analyst

C.

Chief information security officer (CISO)

D.

Incident response manager

Question 23

When reviewing encryption applied to data within an organization's databases, a cybersecurity analyst notices that some databases use the encryption algorithms SHA-1 or 3-DES while others use AES-256. Which algorithm should the analyst recommend be used?

Options:

A.

AES-256

B.

TLS 1.1

C.

SHA-1

D.

DES

Question 24

An organization moving its payment card system into a separate location on its network (or security reasons is an example of network:

Options:

A.

redundancy.

B.

segmentation.

C.

encryption.

D.

centricity.

Question 25

Which of the following roles typically performs routine vulnerability scans?

Options:

A.

Incident response manager

B.

Information security manager

C.

IT auditor

D.

IT security specialist

Question 26

Before performing a penetration test for a client, it is MOST crucial to ensure:

Options:

A.

authorized consent is obtained.

B.

the timeframe has been determined.

C.

scope is defined.

D.

price has been estimated.

Question 27

Which of the following network topologies is MOST resilient to network failures and can prevent a single point of failure?

Options:

A.

Mesh

B.

Star

C.

Bus

D.

Ring

Question 28

Which of the following Is a PRIMARY function of a network intrusion detection system (IDS)?

Options:

A.

Dropping network traffic if suspicious packets are detected

B.

Analyzing whether packets are suspicious

C.

Filtering incoming and outgoing network traffic based on security policies

D.

Preventing suspicious packets from being executed

Question 29

Target discovery and service enumeration would MOST likely be used by an attacker who has the initial objective of:

Options:

A.

corrupting process memory, likely resulting in system Instability.

B.

port scanning to identify potential attack vectors.

C.

deploying and maintaining backdoor system access.

D.

gaining privileged access in a complex network environment.

Question 30

A cybersecurity analyst has been asked to review firewall configurations andrecommend which ports to deny in order to prevent users from making outbound non-encrypted connections to the Internet. The organization is concerned that traffic through this type of port is insecure and may be used asanattack vector. Which port should the analyst recommend be denied?

Options:

A.

Port 3389

B.

Port 25

C.

Port 443

D.

Port 80

Question 31

Robust background checks provide protection against:

Options:

A.

distributed dental of service (DDoS) attacks.

B.

insider threats.

C.

phishing.

D.

ransomware.

Question 32

Which of the following is the PRIMARY benefit of implementing logical access controls on a need-to-know basis?

Options:

A.

Limiting access to sensitive data and resources

B.

Ensuring users can access all resources on the network

C.

Providing a consistent user experience across different applications

D.

Reducing the complexity of access control policies and procedures

Question 33

Which of the following Is the MOST effective way to ensure an organization's management of supply chain risk remains consistent?

Options:

A.

Regularly seeking feedback from the procurement team regarding supplier responsiveness

B.

Periodically confirming suppliers' contractual obligations are met

C.

Periodically counting the number of incident tickets associated with supplier services

D.

Regularly meeting with suppliers to informally discuss Issues

Question 34

A penetration tester has been hired and given access to all code, diagrams,and documentation. Which type oftesting is being conducted?

Options:

A.

Full knowledge

B.

Unlimited scope

C.

No knowledge

D.

Partial knowledge

Question 35

Which of the following is the GREATEST risk resulting from a Domain Name System (DNS) cache poisoning attack?

Options:

A.

Reduced system availability

B.

Noncompliant operations

C.

Loss of network visibility

D.

Loss of sensitive data

Question 36

Which of the following is the BEST way for an organization to balance cybersecurity risks and address compliance requirements?

Options:

A.

Accept that compliance requirements may conflict with business needs and operate in a diminished capacity to achieve compliance.

B.

Meet the minimum standards for the compliance requirements to ensure minimal impact to business operations,

C.

Evaluate compliance requirements in thecontext at business objectives to ensure requirements can be implemented appropriately.

D.

Implement only the compliance requirements that do not Impede business functions or affect cybersecurity risk.

Question 37

After identified weaknesses have been remediated, which of the following should be completed NEXT?

Options:

A.

Perform a validation scan before moving to production.

B.

Perform software code testing.

C.

Perform a software quality assurance (QA) activity.

D.

Move the fixed system directly to production.

Question 38

Which of the following utilities is MOST suitable for administrative tasks and automation?

Options:

A.

Command line Interface (CLI)

B.

Integrated development environment (IDE)

C.

System service dispatcher (SSO)

D.

Access control list (ACL)

Question 39

A small organization has identified a potential risk associated with its outdated backup system and has decided to implement a new cloud-based real-time backup system to reduce the likelihood of data loss. Which of the following risk responses has the organization chosen?

Options:

A.

Risk mitigation

B.

Risk avoidance

C.

Risk transfer

D.

Risk acceptance

Question 40

Which ofthe following is .1 PRIMARY output from the development of a cyber risk management strategy?

Options:

A.

Accepted processes are Identified.

B.

Business goals are communicated.

C.

Compliance implementation is optimized.

D.

Mitigation activities are defined.

Question 41

Which of the following BEST describes privilege escalation in the context of kernel security?

Options:

A.

A process by which an attacker gains unauthorized access to user data

B.

A security vulnerability in the operating system that triggers buffer overflows

C.

A type of code to inject malware into the kernel

D.

A technique used by attackers to bypass kernel-level security controls

Demo: 41 questions
Total 139 questions