Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

CCOA Sample Questions Answers

Questions 4

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the contents of the file and save the output in atext file with a filename of pcap_artifact5_decoded.txton the Analyst Desktop.

Options:

Buy Now
Questions 5

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which host IP was targeted during the following timeframe: 11:39 PM to 11:43 PM (Absolute) on August 16,2024?

Options:

Buy Now
Questions 6

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

Perform a query of startup items for the agent.nameaccounting-pc in the SIEM for the last 24 hours. Identifythe file name that triggered RuleName SuspiciousPowerShell. Enter your response below. Your responsemust include the file extension.

Options:

Buy Now
Questions 7

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the name of the file containing the ransomwaredemand? Your response must include the fileextension.

Options:

Buy Now
Questions 8

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What date was the webshell accessed? Enter the formatas YYYY-MM-DD.

Options:

Buy Now
Questions 9

Question 1 and 2

You have been provided with authentication logs toinvestigate a potential incident. The file is titledwebserver-auth-logs.txt and located in theInvestigations folder on the Desktop.

Which IP address is performing a brute force attack?

What is the total number of successful authenticationsby the IP address performing the brute force attack?

Options:

Buy Now
Questions 10

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?

Options:

Buy Now
Questions 11

How can port security protect systems on a segmented network?

Options:

A.

By enforcing encryption of data on the network

B.

By preventing unauthorized access to the network

C.

By establishing a Transport Layer Security (TLS) handshake

D.

By requiring multi-factor authentication

Buy Now
Questions 12

Which of the following is a network port for service message block (SMS)?

Options:

A.

445

B.

143

C.

389

D.

22

Buy Now
Questions 13

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many logs are associated with well knownunencrypted web traffic for the month of December2023 (Absolute)? Note: Security Onion refers to logsas documents.

Options:

Buy Now
Questions 14

Cyber Analyst Password:

For questions that require use of the SIEM, pleasereference the information below:

https://10.10.55.2

Security-Analyst!

CYB3R-4n4ly$t!

Email Address:

ccoatest@isaca.org

Password:Security-Analyst!

The enterprise has been receiving a large amount offalse positive alerts for the eternalblue vulnerability. TheSIEM rulesets are located in

/home/administrator/hids/ruleset/rules.

What is the name of the file containing the ruleset foreternalblue connections? Your response must includethe file extension.

Options:

Buy Now
Questions 15

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

What is the name of the suspected malicious filecaptured by keyword process.executable at 11:04 PM?

Options:

Buy Now
Questions 16

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which of the following domain name(s) from the CCOAThreat Bulletin.pdf was contacted between 12:10 AMto 12:12 AM (Absolute) on August 17, 2024?

Options:

Buy Now
Questions 17

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

What is the name of the service that the malware attempts to install?

Options:

Buy Now
Questions 18

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the full User-Agent value associated with theransomware demand file download. Enter your responsein the field below.

Options:

Buy Now
Questions 19

Which ruleset can be applied in the

/home/administrator/hids/ruleset/rules directory?

Double-click each image to view it larger.

Options:

Buy Now
Questions 20

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

Based on the contents of the malscript.viruz.txt, whichthreat actor group is the malware associated with?

Options:

Buy Now
Questions 21

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many unique IPs have received well knownunencrypted web connections from the beginning of2022 to the end of 2023 (Absolute)?

Options:

Buy Now
Questions 22

Which of the following is the BEST way for an organization to balance cybersecurity risks and address compliance requirements?

Options:

A.

Accept that compliance requirements may conflict with business needs and operate in a diminished capacity to achieve compliance.

B.

Meet the minimum standards for the compliance requirements to ensure minimal impact to business operations,

C.

Evaluate compliance requirements in thecontext at business objectives to ensure requirements can be implemented appropriately.

D.

Implement only the compliance requirements that do not Impede business functions or affect cybersecurity risk.

Buy Now
Questions 23

Which of the following is foundational for implementing a Zero Trust model?

Options:

A.

Comprehensive process documentation

B.

Robust network monitoring

C.

Routine vulnerability and penetration testing

D.

Identity and access management (IAM) controls

Buy Now
Questions 24

A bank employee is found to beexfiltrationsensitive information by uploading it via email. Which of the following security measures would be MOST effective in detecting this type of insider threat?

Options:

A.

Data loss prevention (DIP)

B.

Intrusion detection system (IDS)

C.

Network segmentation

D.

Security information and event management (SIEM)

Buy Now
Questions 25

Before performing a penetration test for a client, it is MOST crucial to ensure:

Options:

A.

authorized consent is obtained.

B.

the timeframe has been determined.

C.

scope is defined.

D.

price has been estimated.

Buy Now
Questions 26

Which of the following Is a PRIMARY function of a network intrusion detection system (IDS)?

Options:

A.

Dropping network traffic if suspicious packets are detected

B.

Analyzing whether packets are suspicious

C.

Filtering incoming and outgoing network traffic based on security policies

D.

Preventing suspicious packets from being executed

Buy Now
Questions 27

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the C2 host of the attack. Enter your responsebelow.

Options:

Buy Now
Questions 28

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

Use the IOCs to find the compromised host. Enter thehost name identified in the keyword agent.name fieldbelow.

Options:

Buy Now
Questions 29

Which of the following should be completedFIRSTin a data loss prevention (OLP) system implementation project?

Options:

A.

Deployment scheduling

B.

Data analysis

C.

Data Inventory

D.

Resource allocation

Buy Now
Questions 30

Which of the following is the MOST effective method for identifying vulnerabilities in a remote web application?

Options:

A.

Source code review

B.

Dynamic application security testing (DA5T)

C.

Penetration testing

D.

Static application security testing (SAST)

Buy Now
Questions 31

Which of the following is the MOST effective way to obtain business owner approval of cybersecurity initiatives across an organisation?

Options:

A.

Provide data classifications.

B.

Create a steering committee.

C.

Generate progress reports.

D.

Conduct an Internal audit.

Buy Now
Questions 32

Which of the following has been defined when a disaster recovery plan (DRP) requires daily backups?

Options:

A.

Maximum tolerable downtime (MTD)

B.

Recovery time objective (RTO|

C.

Recovery point objective {RPO)

D.

Mean time to failure (MTTF)

Buy Now
Questions 33

Which of the following is a PRIMARY risk that can be introduced through the use of a site-to-site virtual private network (VPN) with a service provider?

Options:

A.

Loss of data integrity

B.

Gaps in visibility to user behavior

C.

Data exfiltration

D.

Denial of service (DoS) attacks

Buy Now
Questions 34

What is the GREATEST security concern associated with virtual (nation technology?

Options:

A.

Inadequate resource allocation

B.

Insufficient isolation between virtual machines (VMs)

C.

Shared network access

D.

Missing patch management for the technology

Buy Now
Questions 35

Which of the following risks is MOST relevant to cloud auto-scaling?

Options:

A.

Loss of confidentiality

B.

Loss of integrity

C.

Data breaches

D.

Unforeseen expenses

Buy Now
Questions 36

Which of the following is MOST important for maintaining an effective risk management program?

Options:

A.

Approved budget

B.

Automated reporting

C.

Monitoring regulations

D.

Ongoing review

Buy Now
Questions 37

Which of the following roles is responsible for approving exceptions to and deviations from the incident management team charter on an ongoing basis?

Options:

A.

Security steering group

B.

Cybersecurity analyst

C.

Chief information security officer (CISO)

D.

Incident response manager

Buy Now
Questions 38

An organization moving its payment card system into a separate location on its network (or security reasons is an example of network:

Options:

A.

redundancy.

B.

segmentation.

C.

encryption.

D.

centricity.

Buy Now
Questions 39

When reviewing encryption applied to data within an organization's databases, a cybersecurity analyst notices that some databases use the encryption algorithms SHA-1 or 3-DES while others use AES-256. Which algorithm should the analyst recommend be used?

Options:

A.

AES-256

B.

TLS 1.1

C.

SHA-1

D.

DES

Buy Now
Questions 40

Which of the following is the PRIMARY risk associated with cybercriminals eavesdropping on unencrypted network traffic?

Options:

A.

Data notification

B.

Data exfiltration

C.

Data exposure

D.

Data deletion

Buy Now
Questions 41

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Generate a SHA256 digest of the System-logs.evtx filewithin the win-webserver01_logs.zip file and providethe output below.

Options:

Buy Now
Exam Code: CCOA
Exam Name: ISACA Certified Cybersecurity Operations Analyst
Last Update: Jul 1, 2025
Questions: 139
$99.6  $249
$90  $225
$79.6  $199
buy now CCOA