Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CCOA Practice Exam with Questions & Answers | Set: 3

Questions 21

Which of the following utilities is MOST suitable for administrative tasks and automation?

Options:
A.

Command line Interface (CLI)

B.

Integrated development environment (IDE)

C.

System service dispatcher (SSO)

D.

Access control list (ACL)

Isaca CCOA Premium Access
Questions 22

Which of the following Is a PRIMARY function of a network intrusion detection system (IDS)?

Options:
A.

Dropping network traffic if suspicious packets are detected

B.

Analyzing whether packets are suspicious

C.

Filtering incoming and outgoing network traffic based on security policies

D.

Preventing suspicious packets from being executed

Questions 23

An organization continuously monitors enforcement of the least privilege principle and requires users and devices to re-authenticate at multiple levels of a system. Which type of security model has been adopted?

Options:
A.

Security-in-depth model

B.

Layered security model

C.

Zero Trust model

D.

Defense-in-depth model

Questions 24

In which cloud service model are clients responsible for regularly updating the operating system?

Options:
A.

Infrastructure as a Service (laaS)

B.

Software as a Service (SaaS)

C.

Database as a Service (OBaaS)

D.

Platform as a Service (PaaS)

Questions 25

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which of the following domain name(s) from the CCOAThreat Bulletin.pdf was contacted between 12:10 AMto 12:12 AM (Absolute) on August 17, 2024?

Options:
Questions 26

When reviewing encryption applied to data within an organization's databases, a cybersecurity analyst notices that some databases use the encryption algorithms SHA-1 or 3-DES while others use AES-256. Which algorithm should the analyst recommend be used?

Options:
A.

AES-256

B.

TLS 1.1

C.

SHA-1

D.

DES

Questions 27

Which of the following is the BEST way for an organization to balance cybersecurity risks and address compliance requirements?

Options:
A.

Accept that compliance requirements may conflict with business needs and operate in a diminished capacity to achieve compliance.

B.

Meet the minimum standards for the compliance requirements to ensure minimal impact to business operations,

C.

Evaluate compliance requirements in thecontext at business objectives to ensure requirements can be implemented appropriately.

D.

Implement only the compliance requirements that do not Impede business functions or affect cybersecurity risk.

Questions 28

Which of the following BEST describes privilege escalation in the context of kernel security?

Options:
A.

A process by which an attacker gains unauthorized access to user data

B.

A security vulnerability in the operating system that triggers buffer overflows

C.

A type of code to inject malware into the kernel

D.

A technique used by attackers to bypass kernel-level security controls

Questions 29

Most of the operational responsibility remains with the customerin which of the following cloudservice models?

Options:
A.

Data Platform as a Service (DPaaS)

B.

Software as a Service (SaaS)

C.

Platform as a Service (PaaS)

D.

Infrastructure as a Service (laaS)

Questions 30

Before performing a penetration test for a client, it is MOST crucial to ensure:

Options:
A.

authorized consent is obtained.

B.

the timeframe has been determined.

C.

scope is defined.

D.

price has been estimated.