Pass the Isaca Cybersecurity Audit CCOA Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?


Questions # 22:

Which of the following is theMOSTimportant component oftheasset decommissioning process from a data risk perspective?

Options:

A.

Informing the data owner when decommissioning is complete


B.

Destruction of data on the assets


C.

Updating the asset status in the configuration management database (CMD8)


D.

Removing the monitoring of the assets


Questions # 23:

A penetration tester has been hired and given access to all code, diagrams,and documentation. Which type oftesting is being conducted?

Options:

A.

Full knowledge


B.

Unlimited scope


C.

No knowledge


D.

Partial knowledge


Questions # 24:

An organization's hosted database environment is encrypted by the vendor at rest and in transit. The database was accessed, and critical data was stolen. Which of the following is the MOST likely cause?

Options:

A.

Use of group rights for access


B.

Improper backup procedures


C.

Misconfigured access control list (ACL)


D.

Insufficiently strong encryption


Questions # 25:

Which of the following is a KEY difference between traditional deployment methods and continuous integration/continuous deployment (CI/CD)?

Options:

A.

CI/CD decreases the frequency of updates.


B.

CI/CD decreases the amount of testing.


C.

CI/CD increases the number of errors.


D.

CI/CD Increases the speed of feedback.


Questions # 26:

An attacker has compromised a number of systems on an organization'snetwork andisexfiltrationdata Usingthe Domain Name System (DNS) queries. Whichof the following is the BEST mitigation strategy to prevent data exfiltration using this technique?

mitigation strategy to prevent data exfiltration using this technique?

Options:

A.

Implement Secure Sockets Layer (SSL) encryption on the DNS server.


B.

Install a host-based Intrusion detection system (HIDS) on all systems in the network.


C.

Block all outbound DNS traffic from the network.


D.

Implement a DNS sinkhole to redirect alt DNS traffic to a dedicated server.


Questions # 27:

Which type of cloud deployment model is intended to be leveraged over the Internet by many organizations with varying needs and requirements?

Options:

A.

Hybrid cloud


B.

Community cloud


C.

Public cloud


D.

Private cloud


Questions # 28:

An attacker has exploited an e-commerce website by injecting arbitrary syntax that was passed to and executed by the underlying operating system. Which of the following tactics did the attacker MOST likely use?

Options:

A.

Command injection


B.

Injection


C.

Lightweight Directory Access Protocol (LDAP) Injection


D.

Insecure direct object reference


Questions # 29:

Which of the following is the PRIMARY reason for tracking the effectiveness of vulnerability remediation processes within an organization?

Options:

A.

To provide reports to senior management so that they can justify the expense of vulnerability management tools


B.

To identify executives who are responsible for delaying patching and report them to the board


C.

To ensure employees responsible for patching vulnerabilities are actually doing their job correctly


D.

To reduce the likelihood of a threat actor successfully exploiting vulnerabilities In the organization's systems


Questions # 30:

Exposing the session identifier in a URL is an example of which web application-specific risk?

Options:

A.

Cryptographic failures


B.

Insecure design and implementation


C.

Identification and authentication failures


D.

Broken access control


Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions