Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CCOA Questions and Answers

Question # 6

In the Open Systems Interconnection (OSI) Model for computer networking, which of the following is the function of the network layer?

A.

Facilitating communications with applications running on other computers

B.

Transmitting data segments between points on a network

C.

Translating data between a networking service and an application

D.

Structuring and managing a multi-node network

Full Access
Question # 7

Which layer ofthe TCP/IP stack promotes the reliable transmission of data?

A.

Link

B.

Internet

C.

Application

D.

Transport

Full Access
Question # 8

SOAP and REST are Iwo different approaches related to:

A.

machine learning (ML) design.

B.

cloud-based anomaly detection.

C.

SG/6G networks.

D.

application programming Interface (API) design.

Full Access
Question # 9

Which of the following has been established when a business continuity manager explains that a critical system can be unavailable up to 4 hours before operation is significantly impaired?

A.

Maximum tolerable downtime (MID)

B.

Service level agreement (SLA)

C.

Recovery point objective (RPO)

D.

Recovery time objective (RTO)

Full Access
Question # 10

Which of the following roles typically performs routine vulnerability scans?

A.

Incident response manager

B.

Information security manager

C.

IT auditor

D.

IT security specialist

Full Access
Question # 11

Which of the following should be completedFIRSTin a data loss prevention (OLP) system implementation project?

A.

Deployment scheduling

B.

Data analysis

C.

Data Inventory

D.

Resource allocation

Full Access
Question # 12

Which of the following utilities is MOST suitable for administrative tasks and automation?

A.

Command line Interface (CLI)

B.

Integrated development environment (IDE)

C.

System service dispatcher (SSO)

D.

Access control list (ACL)

Full Access
Question # 13

Which of the following risks is MOST relevant to cloud auto-scaling?

A.

Loss of confidentiality

B.

Loss of integrity

C.

Data breaches

D.

Unforeseen expenses

Full Access
Question # 14

Which type of middleware is used for connecting software components thatarewritten in different programming languages?

A.

Transaction processing middleware

B.

Remote procedure call middleware

C.

Message-oriented middleware

D.

Object-oriented middleware

Full Access
Question # 15

Before performing a penetration test for a client, it is MOST crucial to ensure:

A.

authorized consent is obtained.

B.

the timeframe has been determined.

C.

scope is defined.

D.

price has been estimated.

Full Access
Question # 16

Which of the following would BCST enable an organization to prioritize remediation activities when multiple vulnerabilities are identified?

A.

Business Impact analysis (BIA)

B.

Vulnerability exception process

C.

executive reporting process

D.

Risk assessment

Full Access
Question # 17

Which of the following is a technique for detecting anomalous network behavior that evolves using large data sets and algorithms?

A.

Machine learning-based analysis

B.

Statistical analysis

C.

Rule-based analysis

D.

Signature-based analysis

Full Access
Question # 18

Robust background checks provide protection against:

A.

distributed dental of service (DDoS) attacks.

B.

insider threats.

C.

phishing.

D.

ransomware.

Full Access
Question # 19

A small organization has identified a potential risk associated with its outdated backup system and has decided to implement a new cloud-based real-time backup system to reduce the likelihood of data loss. Which of the following risk responses has the organization chosen?

A.

Risk mitigation

B.

Risk avoidance

C.

Risk transfer

D.

Risk acceptance

Full Access
Question # 20

Which of the following services would pose the GREATEST risk when used to permit access to and from the Internet?

A.

Server Message Block (5MB) on TCP 445

B.

File Transfer Protocol(FTP) on TCP 21

C.

Domain Name Service (DNS) on UOP 53

D.

Remote Desktop Protocol (RDP) on TCP 3389

Full Access
Question # 21

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

What is the name of the suspected malicious filecaptured by keyword process.executable at 11:04 PM?

Full Access
Question # 22

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What date was the webshell accessed? Enter the formatas YYYY-MM-DD.

Full Access
Question # 23

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What is the filename of the webshell used to control thehost 10.10.44.200? Your response must include the fileextension.

Full Access
Question # 24

Question 1 and 2

You have been provided with authentication logs toinvestigate a potential incident. The file is titledwebserver-auth-logs.txt and located in theInvestigations folder on the Desktop.

Which IP address is performing a brute force attack?

What is the total number of successful authenticationsby the IP address performing the brute force attack?

Full Access
Question # 25

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many logs are associated with well knownunencrypted web traffic for the month of December2023 (Absolute)? Note: Security Onion refers to logsas documents.

Full Access
Question # 26

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

What is the name of the service that the malware attempts to install?

Full Access
Question # 27

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the C2 host of the attack. Enter your responsebelow.

Full Access
Question # 28

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which of the following domain name(s) from the CCOAThreat Bulletin.pdf was contacted between 12:10 AMto 12:12 AM (Absolute) on August 17, 2024?

Full Access
Question # 29

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

The following credentials are used for thisquestion.

Username:Accounting

Password:1x-4cc0unt1NG-x1

Using the provided credentials, SSH to the Accountingworkstation and generate a SHA256 checksum of the filethat triggered RuleName Suspicious PowerShell usingeither certutil or Get-FileHash of the file causing theissue. Copy the hash and paste it below.

Full Access
Question # 30

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

Based on the contents of the malscript.viruz.txt, whichthreat actor group is the malware associated with?

Full Access
Question # 31

Cyber Analyst Password:

For questions that require use of the SIEM, pleasereference the information below:

https://10.10.55.2

Security-Analyst!

CYB3R-4n4ly$t!

Email Address:

ccoatest@isaca.org

Password:Security-Analyst!

The enterprise has been receiving a large amount offalse positive alerts for the eternalblue vulnerability. TheSIEM rulesets are located in

/home/administrator/hids/ruleset/rules.

What is the name of the file containing the ruleset foreternalblue connections? Your response must includethe file extension.

Full Access
Question # 32

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the targets within the file pcap_artifact5.txt.

Select the correct decoded targets below.

10cal.com/exam

clOud-s3cure.com

c0c0nutf4rms.net

h3avy_s3as.biz

b4ddata.org

Full Access
Question # 33

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which host IP was targeted during the following timeframe: 11:39 PM to 11:43 PM (Absolute) on August 16,2024?

Full Access
Question # 34

Which ruleset can be applied in the

/home/administrator/hids/ruleset/rules directory?

Double-click each image to view it larger.

Full Access
Question # 35

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the contents of the file and save the output in atext file with a filename of pcap_artifact5_decoded.txton the Analyst Desktop.

Full Access
Question # 36

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many unique IPs have received well knownunencrypted web connections from the beginning of2022 to the end of 2023 (Absolute)?

Full Access
Question # 37

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

Perform a query of startup items for the agent.nameaccounting-pc in the SIEM for the last 24 hours. Identifythe file name that triggered RuleName SuspiciousPowerShell. Enter your response below. Your responsemust include the file extension.

Full Access
Question # 38

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the name of the file containing the ransomwaredemand? Your response must include the fileextension.

Full Access
Question # 39

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the full User-Agent value associated with theransomware demand file download. Enter your responsein the field below.

Full Access
Question # 40

For this question you must log into GreenboneVulnerability Manager using Firefox. The URL is:https://10.10.55.4:9392 and credentials are:

Username:admin

Password:Secure-gvm!

A colleague performed a vulnerability scan but did notreview prior to leaving for a family emergency. It hasbeen determined that a threat actor is using CVE-2021-22145 in the wild. What is the host IP of the machinethat is vulnerable to this CVE?

Full Access
Question # 41

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

Use the IOCs to find the compromised host. Enter thehost name identified in the keyword agent.name fieldbelow.

Full Access