ANSWERS (UPDATED TO PASS)
1. A company has hired a third-party to gather
Passive
infor- mation about the company's servers and reconnaissance.
data. This third-party will not have direct
access to the compa- ny's internal network, but
they can gather information from any other
source. Which of the following would BEST
describe this approach?
2. A company's email server has received an email from a DMARC
(Domain-based
third-party, but the origination server does notMessage Authentication
match the list of authorized devices. Which Reporting and Confor-
of the following would determine the mance)
disposition of this message?
Organized crime
3. Which of these threat actors would be MOST
likely to attack systems for direct financial
gain?
4. A security administrator has examined a server recent- Root cause
analysis
ly compromised by an attacker, and has
determined the system was exploited due to a
known operating system vulnerability. Which
of the following would BEST describe this
finding?
5. A city is building an ambulance service database
network for emergency medical dispatching. containing
Which of the follow- ing should have the private
highest priority? customer
information.
6. A system administrator receives a text alert Which of
when ac- cess rights are changed on a
, PM EXAM A WITH ALL CORRECT & VERIFIED
ANSWERS (UPDATED TO PASS)
the following would describe this alert? System availability
7. A security administrator is concerned about
the po- tential for a data exfiltration using
external storage Automation
Create an operating
sys- tem security policy
to block
, PM EXAM A WITH ALL CORRECT & VERIFIED
ANSWERS (UPDATED TO PASS)
drives. Which of the following would be the BEST E. Consolidat
way to prevent this method of data e all logs on
exfiltration? a SIEM
(Security
8. A company creates a standard set of Information
government re- ports each calendar quarter. and Event
Which of the following would describe this Managemen
type of data? t)
F.Archive
9. An insurance company has created a set of
the
policies to handle data breaches. The security encryption
team has been keys of all
given this set of requirements based on these disabled
policies: Access records from all devices must accounts
be saved and archived G. Enable
time-of-
Any data access outside of normal working hours day
must be immediately reported restrictions
on the
Access logs and audit reports must be created authentica-
from a single database tion server.
Which of the following should be implemented
by
the security team to meet these requirements?
(Select THREE)
A. Restrict login access by IP address and GPS
location
B. Require government-issued identification
during the onboarding process
C. Add additional password complexity for
accounts that access data
D. Conduct monthly permission auditing
, PM EXAM A WITH ALL CORRECT & VERIFIED
ANSWERS (UPDATED TO PASS)
the use of removable me- dia
Regulated
A, E, and G