Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CCOA Exam Dumps - ISACA Certified Cybersecurity Operations Analyst

Go to page:
Question # 9

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What is the filename of the webshell used to control thehost 10.10.44.200? Your response must include the fileextension.

Full Access
Question # 10

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Create a new case in Security Onion from the win-webserver01_logs.zip file. The case title is WindowsWebserver Logs - CCOA New Case and TLP must beset to Green. No additional fields are required.

Full Access
Question # 11

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

Use the IOCs to find the compromised host. Enter thehost name identified in the keyword agent.name fieldbelow.

Full Access
Question # 12

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?

Full Access
Question # 13

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Generate a SHA256 digest of the System-logs.evtx filewithin the win-webserver01_logs.zip file and providethe output below.

Full Access
Question # 14

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the contents of the file and save the output in atext file with a filename of pcap_artifact5_decoded.txton the Analyst Desktop.

Full Access
Question # 15

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the full User-Agent value associated with theransomware demand file download. Enter your responsein the field below.

Full Access
Question # 16

A bank employee is found to beexfiltrationsensitive information by uploading it via email. Which of the following security measures would be MOST effective in detecting this type of insider threat?

A.

Data loss prevention (DIP)

B.

Intrusion detection system (IDS)

C.

Network segmentation

D.

Security information and event management (SIEM)

Full Access
Go to page: