Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CCOA Exam Dumps - ISACA Certified Cybersecurity Operations Analyst

Go to page:
Question # 17

An organization uses containerization for its business application deployments, and all containers run on the same host, so they MUST share the same:

A.

user data.

B.

database.

C.

operating system.

D.

application.

Full Access
Question # 18

Which of the following roles is responsible for approving exceptions to and deviations from the incident management team charter on an ongoing basis?

A.

Security steering group

B.

Cybersecurity analyst

C.

Chief information security officer (CISO)

D.

Incident response manager

Full Access
Question # 19

Cyber threat intelligence is MOST important for:

A.

performing root cause analysis for cyber attacks.

B.

configuring SIEM systems and endpoints.

C.

recommending best practices for database security.

D.

revealing adversarial tactics, techniques, and procedures.

Full Access
Question # 20

When reviewing encryption applied to data within an organization's databases, a cybersecurity analyst notices that some databases use the encryption algorithms SHA-1 or 3-DES while others use AES-256. Which algorithm should the analyst recommend be used?

A.

AES-256

B.

TLS 1.1

C.

SHA-1

D.

DES

Full Access
Question # 21

Which layer ofthe TCP/IP stack promotes the reliable transmission of data?

A.

Link

B.

Internet

C.

Application

D.

Transport

Full Access
Question # 22

Which of the following would BCST enable an organization to prioritize remediation activities when multiple vulnerabilities are identified?

A.

Business Impact analysis (BIA)

B.

Vulnerability exception process

C.

executive reporting process

D.

Risk assessment

Full Access
Question # 23

Which ofthe following BEST enables a cybersecurity analyst to influence the acceptance of effective security controls across an organization?

A.

Contingency planning expertise

B.

Knowledge of cybersecurity standards

C.

Communication skills

D.

Critical thinking

Full Access
Question # 24

Which of the following MOST effectively minimizes the impact of a control failure?

A.

Business continuityplan [BCP

B.

Business impact analysis (B1A)

C.

Defense in depth

D.

Information security policy

Full Access
Go to page: