Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

PCI-DSS ISA Exam Questions and Answers Graded A+

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
09-09-2023
Written in
2023/2024

Perimeter firewalls installed ______________________________. between all wireless networks and the CHD environment. Where should firewalls be installed? At each Internet connection and between any DMZ and the internal network. Review of firewall and router rule sets at least every __________________. 6 months If disk encryption is used logical access must be managed separately and independently of native operating system authentication and access control mechanisms Manual clear-text key-management procedures specify processes for the use of the following: Split knowledge AND Dual control of keys What is considered "Sensitive Authentication Data"? Card verification value

Show more Read less
Institution
Course

Content preview

PCI-DSS ISA Exam Questions and
Answers Graded A+
Perimeter firewalls installed ______________________________. ✔✔between all wireless

networks and the CHD environment.




Where should firewalls be installed? ✔✔At each Internet connection and between any DMZ and

the internal network.




Review of firewall and router rule sets at least every __________________. ✔✔6 months




If disk encryption is used ✔✔logical access must be managed separately and independently of

native operating system authentication and access control mechanisms




Manual clear-text key-management procedures specify processes for the use of the following:

✔✔Split knowledge AND Dual control of keys




What is considered "Sensitive Authentication Data"? ✔✔Card verification value

, When a PAN is displayed to an employee who does NOT need to see the full PAN, the minimum

digits to be masked are: All digits between the ___________ and the __________. ✔✔first 6;

last 4




Regarding protection of PAN... ✔✔PAN must be rendered unreadable during the transmission

over public and wireless networks.




Under requirement 3.4, what method must be used to render the PAN unreadable? ✔✔Hashing

the entire PAN using strong cryptography




Weak security controls that should NOT be used ✔✔WEP, SSL, and TLS 1.0 or earlier




Per requirement 5, anti-virus technology must be deployed_________________ ✔✔on all

system components commonly affected by malicious software.




Key functions for anti-vius program per Requirement 5: ✔✔1) Detect


2) Remove

3) Protect

Written for

Course

Document information

Uploaded on
September 9, 2023
Number of pages
14
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
Jessypeace

Get to know the seller

Seller avatar
Jessypeace jkuat
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
3 year
Number of followers
1
Documents
899
Last sold
1 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions