Try 12 ISACA Certified Cybersecurity Operations Analyst (CCOA) sample questions on monitoring, triage, incident response, vulnerability handling, evidence, escalation, and security-operations judgment, then use the Notify me form for IT Mastery practice updates.
ISACA Certified Cybersecurity Operations Analyst (CCOA) is a security-operations route for candidates who need to triage alerts, preserve evidence, escalate incidents, and connect technical signals to business risk.
These original sample questions preview the SOC-style reasoning a full IT Mastery route should use. They are not official ISACA exam questions.
Topic: alert triage
A SIEM alert shows impossible travel for a privileged account and a successful login from an unfamiliar country. What should be done first?
Best answer: B
Explanation: Privileged-account anomalies need rapid validation and escalation. Analysts should preserve evidence and follow the process rather than acting blindly.
Topic: evidence
Why should an analyst preserve raw logs before changing affected systems?
Best answer: D
Explanation: Logs can be overwritten or altered during response. Preserving evidence supports root-cause analysis, reporting, and potential legal or compliance needs.
Topic: phishing
Several users report the same suspicious link. One user entered credentials. What is the best next step?
Best answer: A
Explanation: Credential entry changes the risk level. Response should include containment, indicator blocking, user scope, and access review.
Topic: vulnerability priority
A critical vulnerability is exploitable remotely on an internet-facing system. What should drive priority?
Best answer: C
Explanation: Vulnerability risk combines severity, exploitability, exposure, asset value, and available controls.
Topic: containment
Malware is actively communicating with a known command-and-control host. What is the best initial action?
Best answer: B
Explanation: Active malicious communication requires containment. Evidence and scope should be preserved before eradication.
Topic: escalation
An incident may involve regulated personal data. What should the analyst do?
Best answer: D
Explanation: Potential data exposure has legal and privacy implications. Analysts should escalate through approved procedures.
Topic: false positives
A detection rule generates many alerts that are consistently benign. What should the SOC do?
Best answer: A
Explanation: Tuning should reduce noise without losing coverage. Evidence and testing are needed before changing detection logic.
Topic: endpoint response
An endpoint shows suspicious PowerShell execution. Which evidence is most useful?
Best answer: C
Explanation: Process lineage, command arguments, user context, and related activity help determine whether execution is malicious or authorized.
Topic: communication
During a major incident, what should status updates include?
Best answer: B
Explanation: Good incident communication is factual, concise, and clear about scope, impact, actions, and unknowns.
Topic: indicators
Which item is an indicator of compromise?
Best answer: D
Explanation: IOCs include artifacts such as malicious IPs, domains, hashes, file paths, registry keys, and behavior patterns linked to compromise.
Topic: lessons learned
What is the purpose of a post-incident review?
Best answer: A
Explanation: Lessons learned should improve prevention, detection, response, communication, and recovery.
Topic: log gaps
An analyst cannot determine whether data was accessed because logs were not enabled. What should be reported?
Best answer: C
Explanation: Missing logs reduce assurance and investigation quality. The finding should focus on visibility and remediation.