Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dealsixty

CCOA Exam Dumps - Isaca Cybersecurity Audit Questions and Answers

Question # 24

For this question you must log into GreenboneVulnerability Manager using Firefox. The URL is:https://10.10.55.4:9392 and credentials are:

Username:admin

Password:Secure-gvm!

A colleague performed a vulnerability scan but did notreview prior to leaving for a family emergency. It hasbeen determined that a threat actor is using CVE-2021-22145 in the wild. What is the host IP of the machinethat is vulnerable to this CVE?

Options:

Buy Now
Question # 25

An organization uses containerization for its business application deployments, and all containers run on the same host, so they MUST share the same:

Options:

A.

user data.

B.

database.

C.

operating system.

D.

application.

Buy Now
Question # 26

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

The following credentials are used for thisquestion.

Username:Accounting

Password:1x-4cc0unt1NG-x1

Using the provided credentials, SSH to the Accountingworkstation and generate a SHA256 checksum of the filethat triggered RuleName Suspicious PowerShell usingeither certutil or Get-FileHash of the file causing theissue. Copy the hash and paste it below.

Options:

Buy Now
Question # 27

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the name of the file containing the ransomwaredemand? Your response must include the fileextension.

Options:

Buy Now
Question # 28

Which of the following is the MOST common output of a vulnerability assessment?

Options:

A.

A list of identified vulnerabilities along with a severity level for each

B.

A detailed report on the overall vulnerability posture, including physical security measures

C.

A list of potential attackers along with their IP addresses and geolocation data

D.

A list of authorized users and their access levels for each system and application

Buy Now
Question # 29

Which of the following is the GREATEST risk resulting from a Domain Name System (DNS) cache poisoning attack?

Options:

A.

Reduced system availability

B.

Noncompliant operations

C.

Loss of network visibility

D.

Loss of sensitive data

Buy Now
Question # 30

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What is the filename of the webshell used to control thehost 10.10.44.200? Your response must include the fileextension.

Options:

Buy Now
Question # 31

Which type of security model leverages the use of data science and machine learning (ML) to further enhance threat intelligence?

Options:

A.

Brew-Nash model

B.

Bell-LaPadula confidentiality model

C.

Security-ln-depth model

D.

Layered security model

Buy Now
Question # 32

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What date was the webshell accessed? Enter the formatas YYYY-MM-DD.

Options:

Buy Now
Question # 33

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Generate a SHA256 digest of the System-logs.evtx filewithin the win-webserver01_logs.zip file and providethe output below.

Options:

Buy Now
Exam Code: CCOA
Exam Name: ISACA Certified Cybersecurity Operations Analyst
Last Update: Apr 29, 2025
Questions: 139
CCOA pdf

CCOA PDF

$79.6  $199
CCOA Engine

CCOA Testing Engine

$90  $225
CCOA PDF + Engine

CCOA PDF + Testing Engine

$99.6  $249