Month End Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Isaca CCOA ISACA Certified Cybersecurity Operations Analyst Exam Practice Test

Page: 1 / 14
Total 139 questions

ISACA Certified Cybersecurity Operations Analyst Questions and Answers

Question 1

Which of the following is a technique for detecting anomalous network behavior that evolves using large data sets and algorithms?

Options:

A.

Machine learning-based analysis

B.

Statistical analysis

C.

Rule-based analysis

D.

Signature-based analysis

Question 2

Which of the following is the BEST way for an organization to balance cybersecurity risks and address compliance requirements?

Options:

A.

Accept that compliance requirements may conflict with business needs and operate in a diminished capacity to achieve compliance.

B.

Meet the minimum standards for the compliance requirements to ensure minimal impact to business operations,

C.

Evaluate compliance requirements in thecontext at business objectives to ensure requirements can be implemented appropriately.

D.

Implement only the compliance requirements that do not Impede business functions or affect cybersecurity risk.

Question 3

A cybersecurity analyst has been asked to review firewall configurations andrecommend which ports to deny in order to prevent users from making outbound non-encrypted connections to the Internet. The organization is concerned that traffic through this type of port is insecure and may be used asanattack vector. Which port should the analyst recommend be denied?

Options:

A.

Port 3389

B.

Port 25

C.

Port 443

D.

Port 80

Question 4

Which of the following is MOST likely to result from a poorly enforced bring your own device (8YOD) policy?

Options:

A.

Weak passwords

B.

Network congestion

C.

Shadow IT

D.

Unapproved social media posts

Question 5

Which of the following should be considered FIRST when defining an application security risk metric for an organization?

Options:

A.

Critically of application data

B.

Identification of application dependencies

C.

Creation of risk reporting templates

D.

Alignment with the system development life cycle (SDLC)

Question 6

Which of the following security practices is MOST effective in reducing system risk through system hardening?

Options:

A.

Having more than one user to complete a task

B.

Permitting only the required access

C.

Giving users only the permissions they need

D.

Enabling only the required capabilities

Question 7

Which type of cloud deployment model is intended to be leveraged over the Internet by many organizations with varying needs and requirements?

Options:

A.

Hybrid cloud

B.

Community cloud

C.

Public cloud

D.

Private cloud

Question 8

Which of the following is the PRIMARY risk associated with cybercriminals eavesdropping on unencrypted network traffic?

Options:

A.

Data notification

B.

Data exfiltration

C.

Data exposure

D.

Data deletion

Question 9

Target discovery and service enumeration would MOST likely be used by an attacker who has the initial objective of:

Options:

A.

corrupting process memory, likely resulting in system Instability.

B.

port scanning to identify potential attack vectors.

C.

deploying and maintaining backdoor system access.

D.

gaining privileged access in a complex network environment.

Question 10

How can port security protect systems on a segmented network?

Options:

A.

By enforcing encryption of data on the network

B.

By preventing unauthorized access to the network

C.

By establishing a Transport Layer Security (TLS) handshake

D.

By requiring multi-factor authentication

Question 11

During a post-mortem incident review meeting, it is noted that a malicious attacker attempted to achieve network persistence by using vulnerabilities that appeared to be lower risk but ultimately allowed the attacker to escalate their privileges. Which ofthe following did the attacker MOST likely apply?

Options:

A.

Exploit chaining

B.

Brute force attack

C.

Cross-site scripting

D.

Deployment of rogue wireless access points

Question 12

Robust background checks provide protection against:

Options:

A.

distributed dental of service (DDoS) attacks.

B.

insider threats.

C.

phishing.

D.

ransomware.

Question 13

An attacker has compromised a number of systems on an organization'snetwork andisexfiltrationdata Usingthe Domain Name System (DNS) queries. Whichof the following is the BEST mitigation strategy to prevent data exfiltration using this technique?

mitigation strategy to prevent data exfiltration using this technique?

Options:

A.

Implement Secure Sockets Layer (SSL) encryption on the DNS server.

B.

Install a host-based Intrusion detection system (HIDS) on all systems in the network.

C.

Block all outbound DNS traffic from the network.

D.

Implement a DNS sinkhole to redirect alt DNS traffic to a dedicated server.

Question 14

After identified weaknesses have been remediated, which of the following should be completed NEXT?

Options:

A.

Perform a validation scan before moving to production.

B.

Perform software code testing.

C.

Perform a software quality assurance (QA) activity.

D.

Move the fixed system directly to production.

Question 15

Which ofthe following BEST enables a cybersecurity analyst to influence the acceptance of effective security controls across an organization?

Options:

A.

Contingency planning expertise

B.

Knowledge of cybersecurity standards

C.

Communication skills

D.

Critical thinking

Question 16

An attacker has exploited an e-commerce website by injecting arbitrary syntax that was passed to and executed by the underlying operating system. Which of the following tactics did the attacker MOST likely use?

Options:

A.

Command injection

B.

Injection

C.

Lightweight Directory Access Protocol (LDAP) Injection

D.

Insecure direct object reference

Question 17

Which of the following Is a control message associated with the Internet Control Message Protocol (ICMP)?

Options:

A.

Transport Layer Security (TLS) protocol version Is unsupported.

B.

Destination is unreachable.

C.

404 is not found.

D.

Webserver Is available.

Question 18

Which of the following is the MOST effective way to obtain business owner approval of cybersecurity initiatives across an organisation?

Options:

A.

Provide data classifications.

B.

Create a steering committee.

C.

Generate progress reports.

D.

Conduct an Internal audit.

Question 19

Which of the following BEST describes privilege escalation in the context of kernel security?

Options:

A.

A process by which an attacker gains unauthorized access to user data

B.

A security vulnerability in the operating system that triggers buffer overflows

C.

A type of code to inject malware into the kernel

D.

A technique used by attackers to bypass kernel-level security controls

Question 20

Which of the following is MOST helpful to significantly reduce application risk throughout the system development life cycle (SOLC)?

Options:

A.

Security by design approach

B.

Security through obscurity approach

C.

Peer code reviews

D.

Extensive penetration testing

Question 21

Which of the following is the MOST effective way to prevent man-in-the-middle attacks?

Options:

A.

Changing passwords regularly

B.

Implementing firewalls on the network

C.

Implementing end-to-end encryption

D.

Enabling two-factor authentication

Question 22

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the full User-Agent value associated with theransomware demand file download. Enter your responsein the field below.

Options:

Question 23

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Create a new case in Security Onion from the win-webserver01_logs.zip file. The case title is WindowsWebserver Logs - CCOA New Case and TLP must beset to Green. No additional fields are required.

Options:

Question 24

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

Based on the contents of the malscript.viruz.txt, whichthreat actor group is the malware associated with?

Options:

Question 25

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many unique IPs have received well knownunencrypted web connections from the beginning of2022 to the end of 2023 (Absolute)?

Options:

Question 26

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What is the filename of the webshell used to control thehost 10.10.44.200? Your response must include the fileextension.

Options:

Question 27

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?

Options:

Question 28

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which of the following domain name(s) from the CCOAThreat Bulletin.pdf was contacted between 12:10 AMto 12:12 AM (Absolute) on August 17, 2024?

Options:

Question 29

Cyber Analyst Password:

For questions that require use of the SIEM, pleasereference the information below:

https://10.10.55.2

Security-Analyst!

CYB3R-4n4ly$t!

Email Address:

ccoatest@isaca.org

Password:Security-Analyst!

The enterprise has been receiving a large amount offalse positive alerts for the eternalblue vulnerability. TheSIEM rulesets are located in

/home/administrator/hids/ruleset/rules.

What is the name of the file containing the ruleset foreternalblue connections? Your response must includethe file extension.

Options:

Question 30

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the name of the file containing the ransomwaredemand? Your response must include the fileextension.

Options:

Question 31

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the C2 host of the attack. Enter your responsebelow.

Options:

Question 32

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

Perform a query of startup items for the agent.nameaccounting-pc in the SIEM for the last 24 hours. Identifythe file name that triggered RuleName SuspiciousPowerShell. Enter your response below. Your responsemust include the file extension.

Options:

Question 33

For this question you must log into GreenboneVulnerability Manager using Firefox. The URL is:https://10.10.55.4:9392 and credentials are:

Username:admin

Password:Secure-gvm!

A colleague performed a vulnerability scan but did notreview prior to leaving for a family emergency. It hasbeen determined that a threat actor is using CVE-2021-22145 in the wild. What is the host IP of the machinethat is vulnerable to this CVE?

Options:

Question 34

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

What is the name of the service that the malware attempts to install?

Options:

Question 35

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What date was the webshell accessed? Enter the formatas YYYY-MM-DD.

Options:

Question 36

Which ruleset can be applied in the

/home/administrator/hids/ruleset/rules directory?

Double-click each image to view it larger.

Question # 36

Question # 36

Question # 36

Options:

Question 37

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many logs are associated with well knownunencrypted web traffic for the month of December2023 (Absolute)? Note: Security Onion refers to logsas documents.

Options:

Question 38

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the targets within the file pcap_artifact5.txt.

Select the correct decoded targets below.

10cal.com/exam

clOud-s3cure.com

c0c0nutf4rms.net

h3avy_s3as.biz

b4ddata.org

Options:

Question 39

Question 1 and 2

You have been provided with authentication logs toinvestigate a potential incident. The file is titledwebserver-auth-logs.txt and located in theInvestigations folder on the Desktop.

Which IP address is performing a brute force attack?

What is the total number of successful authenticationsby the IP address performing the brute force attack?

Options:

Question 40

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which host IP was targeted during the following timeframe: 11:39 PM to 11:43 PM (Absolute) on August 16,2024?

Options:

Question 41

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the contents of the file and save the output in atext file with a filename of pcap_artifact5_decoded.txton the Analyst Desktop.

Options:

Page: 1 / 14
Total 139 questions