Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Isaca > Cybersecurity Audit > CCOA

CCOA ISACA Certified Cybersecurity Operations Analyst Question and Answers

Question # 4

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the C2 host of the attack. Enter your responsebelow.

Full Access
Question # 5

Question 1 and 2

You have been provided with authentication logs toinvestigate a potential incident. The file is titledwebserver-auth-logs.txt and located in theInvestigations folder on the Desktop.

Which IP address is performing a brute force attack?

What is the total number of successful authenticationsby the IP address performing the brute force attack?

Full Access
Question # 6

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

Use the IOCs to find the compromised host. Enter thehost name identified in the keyword agent.name fieldbelow.

Full Access
Question # 7

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the name of the file containing the ransomwaredemand? Your response must include the fileextension.

Full Access
Question # 8

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which host IP was targeted during the following timeframe: 11:39 PM to 11:43 PM (Absolute) on August 16,2024?

Full Access
Question # 9

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Generate a SHA256 digest of the System-logs.evtx filewithin the win-webserver01_logs.zip file and providethe output below.

Full Access
Question # 10

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

The following credentials are used for thisquestion.

Username:Accounting

Password:1x-4cc0unt1NG-x1

Using the provided credentials, SSH to the Accountingworkstation and generate a SHA256 checksum of the filethat triggered RuleName Suspicious PowerShell usingeither certutil or Get-FileHash of the file causing theissue. Copy the hash and paste it below.

Full Access
Question # 11

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Create a new case in Security Onion from the win-webserver01_logs.zip file. The case title is WindowsWebserver Logs - CCOA New Case and TLP must beset to Green. No additional fields are required.

Full Access
Question # 12

Cyber Analyst Password:

For questions that require use of the SIEM, pleasereference the information below:

https://10.10.55.2

Security-Analyst!

CYB3R-4n4ly$t!

Email Address:

ccoatest@isaca.org

Password:Security-Analyst!

The enterprise has been receiving a large amount offalse positive alerts for the eternalblue vulnerability. TheSIEM rulesets are located in

/home/administrator/hids/ruleset/rules.

What is the name of the file containing the ruleset foreternalblue connections? Your response must includethe file extension.

Full Access
Question # 13

Which ruleset can be applied in the

/home/administrator/hids/ruleset/rules directory?

Double-click each image to view it larger.

Full Access
Question # 14

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

Based on the contents of the malscript.viruz.txt, whichthreat actor group is the malware associated with?

Full Access
Question # 15

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the full User-Agent value associated with theransomware demand file download. Enter your responsein the field below.

Full Access
Question # 16

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the targets within the file pcap_artifact5.txt.

Select the correct decoded targets below.

10cal.com/exam

clOud-s3cure.com

c0c0nutf4rms.net

h3avy_s3as.biz

b4ddata.org

Full Access
Question # 17

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

What is the name of the suspected malicious filecaptured by keyword process.executable at 11:04 PM?

Full Access
Question # 18

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many logs are associated with well knownunencrypted web traffic for the month of December2023 (Absolute)? Note: Security Onion refers to logsas documents.

Full Access
Question # 19

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?

Full Access
Question # 20

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What date was the webshell accessed? Enter the formatas YYYY-MM-DD.

Full Access
Question # 21

For this question you must log into GreenboneVulnerability Manager using Firefox. The URL is:https://10.10.55.4:9392 and credentials are:

Username:admin

Password:Secure-gvm!

A colleague performed a vulnerability scan but did notreview prior to leaving for a family emergency. It hasbeen determined that a threat actor is using CVE-2021-22145 in the wild. What is the host IP of the machinethat is vulnerable to this CVE?

Full Access
Question # 22

A cybersecurity analyst has been asked to review firewall configurations andrecommend which ports to deny in order to prevent users from making outbound non-encrypted connections to the Internet. The organization is concerned that traffic through this type of port is insecure and may be used asanattack vector. Which port should the analyst recommend be denied?

A.

Port 3389

B.

Port 25

C.

Port 443

D.

Port 80

Full Access
Question # 23

A bank employee is found to beexfiltrationsensitive information by uploading it via email. Which of the following security measures would be MOST effective in detecting this type of insider threat?

A.

Data loss prevention (DIP)

B.

Intrusion detection system (IDS)

C.

Network segmentation

D.

Security information and event management (SIEM)

Full Access
Question # 24

Which ofthe following is .1 PRIMARY output from the development of a cyber risk management strategy?

A.

Accepted processes are Identified.

B.

Business goals are communicated.

C.

Compliance implementation is optimized.

D.

Mitigation activities are defined.

Full Access
Question # 25

An organization continuously monitors enforcement of the least privilege principle and requires users and devices to re-authenticate at multiple levels of a system. Which type of security model has been adopted?

A.

Security-in-depth model

B.

Layered security model

C.

Zero Trust model

D.

Defense-in-depth model

Full Access
Question # 26

After identified weaknesses have been remediated, which of the following should be completed NEXT?

A.

Perform a validation scan before moving to production.

B.

Perform software code testing.

C.

Perform a software quality assurance (QA) activity.

D.

Move the fixed system directly to production.

Full Access
Question # 27

Which of the following is the PRIMARY purpose for an organization to adopt a cybersecurityframework?

A.

To ensure compliance with specific regulations

B.

To automate cybersecurity processes and reduce the need for human intervention

C.

To provide a standardized approach to cybetsecurity risk management

D.

To guarantee protection against possible cyber threats

Full Access
Question # 28

Exposing the session identifier in a URL is an example of which web application-specific risk?

A.

Cryptographic failures

B.

Insecure design and implementation

C.

Identification and authentication failures

D.

Broken access control

Full Access
Question # 29

Which of the following processes is MOST effective for reducing application risk?

A.

Regular third-party risk assessments

B.

Regular code reviews throughout development

C.

Regular vulnerability scans after deployment

D.

Regular monitoring of application use

Full Access
Question # 30

Which of the following is a technique for detecting anomalous network behavior that evolves using large data sets and algorithms?

A.

Machine learning-based analysis

B.

Statistical analysis

C.

Rule-based analysis

D.

Signature-based analysis

Full Access
Question # 31

Which of the following risks is MOST relevant to cloud auto-scaling?

A.

Loss of confidentiality

B.

Loss of integrity

C.

Data breaches

D.

Unforeseen expenses

Full Access
Question # 32

Which of the following is the MOST effective method for identifying vulnerabilities in a remote web application?

A.

Source code review

B.

Dynamic application security testing (DA5T)

C.

Penetration testing

D.

Static application security testing (SAST)

Full Access
Question # 33

An organization's hosted database environment is encrypted by the vendor at rest and in transit. The database was accessed, and critical data was stolen. Which of the following is the MOST likely cause?

A.

Use of group rights for access

B.

Improper backup procedures

C.

Misconfigured access control list (ACL)

D.

Insufficiently strong encryption

Full Access
Question # 34

After an organization's financial system was moved to a cloud-hosted solution that allows single sign-on (SSO) for authentication purposes, data was compromised by an individual logged onto the local network using a compromised username and password. What authentication control would have MOST effectively prevented this situation?

A.

Challenge handshake

B.

Multi-factor

C.

Token-based

D.

Single-factor

Full Access
Question # 35

Which of the following is the GREATEST risk resulting from a Domain Name System (DNS) cache poisoning attack?

A.

Reduced system availability

B.

Noncompliant operations

C.

Loss of network visibility

D.

Loss of sensitive data

Full Access
Question # 36

A penetration tester has been hired and given access to all code, diagrams,and documentation. Which type oftesting is being conducted?

A.

Full knowledge

B.

Unlimited scope

C.

No knowledge

D.

Partial knowledge

Full Access
Question # 37

Which of the following is theMOSTimportant component oftheasset decommissioning process from a data risk perspective?

A.

Informing the data owner when decommissioning is complete

B.

Destruction of data on the assets

C.

Updating the asset status in the configuration management database (CMD8)

D.

Removing the monitoring of the assets

Full Access
Question # 38

Which of the following is the PRIMARY benefit of compiled programming languages?

A.

Streamlined development

B.

Fasterapplication execution

C.

Flexibledeployment

D.

Ability to change code in production

Full Access
Question # 39

When identifying vulnerabilities, which of the following should a cybersecurity analyst determine FIRST?

A.

The number of vulnerabilities Identifiable by the scanning tool

B.

The numberof tested asset types included in the assessment

C.

The vulnerability categories possible for the tested asset types

D.

The vulnerability categories Identifiable by the scanning tool

Full Access
Question # 40

Which of the following Is a control message associated with the Internet Control Message Protocol (ICMP)?

A.

Transport Layer Security (TLS) protocol version Is unsupported.

B.

Destination is unreachable.

C.

404 is not found.

D.

Webserver Is available.

Full Access
Question # 41

Which of the following is a KEY difference between traditional deployment methods and continuous integration/continuous deployment (CI/CD)?

A.

CI/CD decreases the frequency of updates.

B.

CI/CD decreases the amount of testing.

C.

CI/CD increases the number of errors.

D.

CI/CD Increases the speed of feedback.

Full Access