Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CCOA - ISACA Certified Cybersecurity Operations Analyst

Page: 1 / 5
Total 139 questions

A change advisory board Is meeting to review a remediation plan for a critical vulnerability, with a cybersecurity analyst in attendance. When asked about measures to address post-implementation issues, which o! the following would be the analyst's BEST response?

A.

The remediation should be canceled if post-implementation issues are anticipated.

B.

Details for rolling back applied changes should be included In the remediation plan.

C.

The severity of the vulnerability determines whether a rollback plan is required.

D.

The presence of additional onsite staff during the implementation removes the need for a rollback plan.

Robust background checks provide protection against:

A.

distributed dental of service (DDoS) attacks.

B.

insider threats.

C.

phishing.

D.

ransomware.

An organization's hosted database environment is encrypted by the vendor at rest and in transit. The database was accessed, and critical data was stolen. Which of the following is the MOST likely cause?

A.

Use of group rights for access

B.

Improper backup procedures

C.

Misconfigured access control list (ACL)

D.

Insufficiently strong encryption

During a post-mortem incident review meeting, it is noted that a malicious attacker attempted to achieve network persistence by using vulnerabilities that appeared to be lower risk but ultimately allowed the attacker to escalate their privileges. Which ofthe following did the attacker MOST likely apply?

A.

Exploit chaining

B.

Brute force attack

C.

Cross-site scripting

D.

Deployment of rogue wireless access points

A cybersecurity analyst has discovered a vulnerability in an organization's web application. Which ofthe following should be done FIRST to address this vulnerability?

A.

Restart the web server hosting the web application.

B.

Immediately shut down the web application to prevent exploitation.

C.

Follow the organization's incident response management procedures.

D.

Attempt to exploit the vulnerability to determine its severity.

In the Open Systems Interconnection (OSI) Model for computer networking, which of the following is the function of the network layer?

A.

Facilitating communications with applications running on other computers

B.

Transmitting data segments between points on a network

C.

Translating data between a networking service and an application

D.

Structuring and managing a multi-node network

When identifying vulnerabilities, which of the following should a cybersecurity analyst determine FIRST?

A.

The number of vulnerabilities Identifiable by the scanning tool

B.

The numberof tested asset types included in the assessment

C.

The vulnerability categories possible for the tested asset types

D.

The vulnerability categories Identifiable by the scanning tool

A nation-state that is employed to cause financial damage on an organization is BEST categorized as:

A.

a vulnerability.

B.

a risk.

C.

an attach vector.

D.

a threat actor.

An organization continuously monitors enforcement of the least privilege principle and requires users and devices to re-authenticate at multiple levels of a system. Which type of security model has been adopted?

A.

Security-in-depth model

B.

Layered security model

C.

Zero Trust model

D.

Defense-in-depth model

Which of (he following is the PRIMARY reason to regularly review firewall rules?

A.

To identify and remove rules that are no longer needed

B.

To identify and allow blocked traffic that should be permitted

C.

To ensure the rules remain in the correct order

D.

To correct mistakes made by other firewall administrators