Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CCOA Exam Dumps - ISACA Certified Cybersecurity Operations Analyst

Go to page:
Question # 33

A cybersecurity analyst has discovered a vulnerability in an organization's web application. Which ofthe following should be done FIRST to address this vulnerability?

A.

Restart the web server hosting the web application.

B.

Immediately shut down the web application to prevent exploitation.

C.

Follow the organization's incident response management procedures.

D.

Attempt to exploit the vulnerability to determine its severity.

Full Access
Question # 34

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

What is the name of the service that the malware attempts to install?

Full Access
Question # 35

Which of the following is foundational for implementing a Zero Trust model?

A.

Comprehensive process documentation

B.

Robust network monitoring

C.

Routine vulnerability and penetration testing

D.

Identity and access management (IAM) controls

Full Access
Question # 36

Which of the following is the PRIMARY benefit of implementing logical access controls on a need-to-know basis?

A.

Limiting access to sensitive data and resources

B.

Ensuring users can access all resources on the network

C.

Providing a consistent user experience across different applications

D.

Reducing the complexity of access control policies and procedures

Full Access
Question # 37

Which of the following should be the ULTIMATE outcome of adopting enterprise governance of information and technology in cybersecurity?

A.

Business resilience

B.

Risk optimization

C.

Resource optimization

D.

Value creation

Full Access
Question # 38

For this question you must log into GreenboneVulnerability Manager using Firefox. The URL is:https://10.10.55.4:9392 and credentials are:

Username:admin

Password:Secure-gvm!

A colleague performed a vulnerability scan but did notreview prior to leaving for a family emergency. It hasbeen determined that a threat actor is using CVE-2021-22145 in the wild. What is the host IP of the machinethat is vulnerable to this CVE?

Full Access
Question # 39

Which type of access control can be modified by a user or data owner?

A.

Mandatory access control

B.

Role-based access control (RBAC)

C.

Discretionary access control

D.

Rule-based access control

Full Access
Question # 40

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

Perform a query of startup items for the agent.nameaccounting-pc in the SIEM for the last 24 hours. Identifythe file name that triggered RuleName SuspiciousPowerShell. Enter your response below. Your responsemust include the file extension.

Full Access
Go to page: